On Sunday 26 September 2010, Richard Freeman wrote:
*gentoo-sources-2.6.32-r18 (21 Sep 2010)

  21 Sep 2010; Mike Pagano <mpag...@gentoo.org>
  +gentoo-sources-2.6.32-r18.ebuild:
  Linux patch 2.6.32.22. Includes fix for CVE-2010-3301.

*gentoo-sources-2.6.35-r8 (21 Sep 2010)

  21 Sep 2010; Mike Pagano <mpag...@gentoo.org>
  +gentoo-sources-2.6.35-r8.ebuild:
  Linux patch 2.6.35.5. Includes fix for CVE-2010-3301.

*gentoo-sources-2.6.35-r7 (16 Sep 2010)
*gentoo-sources-2.6.34-r10 (16 Sep 2010)

  16 Sep 2010; Mike Pagano <mpag...@gentoo.org>
  +gentoo-sources-2.6.34-r10.ebuild, +gentoo-sources-2.6.35-r7.ebuild:
  Fix for exploit: IA32 Syscall Entry Point Privilege Escalation
  (CVE-2010-3301)

date:
So 26. Sep 13:48:41 CEST 2010

so there has been roughly a week so far.

And the bug is not that dangerous - except when you insist on running unsecure 
32bit software on a 64bit system.

Reply via email to