1 |
On Sunday 26 September 2010, Richard Freeman wrote: |
2 |
*gentoo-sources-2.6.32-r18 (21 Sep 2010) |
3 |
|
4 |
21 Sep 2010; Mike Pagano <mpagano@g.o> |
5 |
+gentoo-sources-2.6.32-r18.ebuild: |
6 |
Linux patch 2.6.32.22. Includes fix for CVE-2010-3301. |
7 |
|
8 |
*gentoo-sources-2.6.35-r8 (21 Sep 2010) |
9 |
|
10 |
21 Sep 2010; Mike Pagano <mpagano@g.o> |
11 |
+gentoo-sources-2.6.35-r8.ebuild: |
12 |
Linux patch 2.6.35.5. Includes fix for CVE-2010-3301. |
13 |
|
14 |
*gentoo-sources-2.6.35-r7 (16 Sep 2010) |
15 |
*gentoo-sources-2.6.34-r10 (16 Sep 2010) |
16 |
|
17 |
16 Sep 2010; Mike Pagano <mpagano@g.o> |
18 |
+gentoo-sources-2.6.34-r10.ebuild, +gentoo-sources-2.6.35-r7.ebuild: |
19 |
Fix for exploit: IA32 Syscall Entry Point Privilege Escalation |
20 |
(CVE-2010-3301) |
21 |
|
22 |
date: |
23 |
So 26. Sep 13:48:41 CEST 2010 |
24 |
|
25 |
so there has been roughly a week so far. |
26 |
|
27 |
And the bug is not that dangerous - except when you insist on running unsecure |
28 |
32bit software on a 64bit system. |