Companies are popping up hoping to crowdsource temporary security patches:<p>patching a 0-day: Windows gdi32.dll memory disclosure | <a href="https://news.ycombinator.com/item?id=13774397" rel="nofollow">https://news.ycombinator.com/item?id=13774397</a> (Mar 2017, 43 comments)<p>>sst8: <i>Live patching is gaining the momentum - see Ksplice, Kpatch, kGraft, XEN and similar</i><p>>dielel: <i>Our micropatch (7 of them, really, for 4 different Windows OS versions) for CVE-2017-0038 is user-mode. As are currently all our micropatches. Processes using gdi32.dll do not need to be relaunched to have it applied.</i><p>--<p>The list of hot-reloading alternatives was awesome; I sometimes wish I could 'star' a single file like that README: <a href="https://github.com/RuntimeCompiledCPlusPlus/RuntimeCompiledCPlusPlus" rel="nofollow">https://github.com/RuntimeCompiledCPlusPlus/RuntimeCompiledC...</a><p>This technique of manually NOP-ing out things at runtime is definitely beyond my usual approach of setting a breakpoint and then choosing where to continue execution manually!