On Sunday 26 September 2010, Richard Freeman wrote: *gentoo-sources-2.6.32-r18 (21 Sep 2010)
21 Sep 2010; Mike Pagano <mpag...@gentoo.org> +gentoo-sources-2.6.32-r18.ebuild: Linux patch 2.6.32.22. Includes fix for CVE-2010-3301. *gentoo-sources-2.6.35-r8 (21 Sep 2010) 21 Sep 2010; Mike Pagano <mpag...@gentoo.org> +gentoo-sources-2.6.35-r8.ebuild: Linux patch 2.6.35.5. Includes fix for CVE-2010-3301. *gentoo-sources-2.6.35-r7 (16 Sep 2010) *gentoo-sources-2.6.34-r10 (16 Sep 2010) 16 Sep 2010; Mike Pagano <mpag...@gentoo.org> +gentoo-sources-2.6.34-r10.ebuild, +gentoo-sources-2.6.35-r7.ebuild: Fix for exploit: IA32 Syscall Entry Point Privilege Escalation (CVE-2010-3301) date: So 26. Sep 13:48:41 CEST 2010 so there has been roughly a week so far. And the bug is not that dangerous - except when you insist on running unsecure 32bit software on a 64bit system.