Let’s talk about kernel releases, the latest two kernel vulnerabilities, and what vanilla or gentoo-sources you should be running.
The two vulnerabilities I’m talking about are:
>=gentoo-sources-2.6.32-r18 and vanilla-sources-188.8.131.52 contain the fixes for both CVE-2010-3081 and CVE-2010-3301.
stable request: http://bugs.gentoo.org/show_bug.cgi?id=338317
>=gentoo-sources-2.6.34-r11 (and no vanilla 2.6.34) contain the fixes for both CVE-2010-3081 and CVE-2010-3301.
stable request: http://bugs.gentoo.org/show_bug.cgi?id=339819
>=gentoo-sources-2.6.35-r8 >= vanilla-sources-184.108.40.206 contain the fixes for both CVE-2010-3081 and CVE-2010-3301.
2.6.35 will only be stabilized after the new baselayout 1.2.14-r1 has been in the tree for 30 days. I described the problem in an earlier blog post so I will not rehash the whole story
If *anyone* feels a kernel version needs to be stabilized we have this cool thing called bugzilla. Open a bug! We also have this other cool thing (I don’t think Gentoo invented it, not sure) called IRC. I am on IRC 24/7 and will always look to see if someone highlights my name. Talk to me first. Then feel free to bash me if I don’t respond in our user’s best interest. I always try to do what’s best for the community and if I am slacking, it’s only due to life/wife/family/job.
The gentoo-sources team actively supports gentoo-source users. No matter the keyword state. We used to only support two versions (current release and 1 – current release). But now we support the latest upstream LTS as well.
We would also welcome any users or devs who are interested in maintaining the kernel at Gentoo to join the team.
Hope this helps clarify things, always feel free to reach out to me.