

{"id":146,"date":"2010-10-19T19:57:54","date_gmt":"2010-10-19T23:57:54","guid":{"rendered":"http:\/\/www.mpagano.com\/blog\/?p=146"},"modified":"2010-10-19T20:28:17","modified_gmt":"2010-10-20T00:28:17","slug":"gentoo-patches-for-kernel-vulnerability-cve-2010-3904","status":"publish","type":"post","link":"https:\/\/www.mpagano.com\/blog\/?p=146","title":{"rendered":"Gentoo Patches for Kernel vulnerability CVE-2010-3904"},"content":{"rendered":"<p>Attention all Media, Gentoo users and my fellow Gentoo devs:<\/p>\n<p>A new \u00a0kernel vulnerability has been reported and the gentoo <a href=\"https:\/\/bugs.gentoo.org\/show_bug.cgi?id=341801\">bug<\/a> has been filed. Within 4 hours of this filing, the kernel team has released the following:<\/p>\n<p>The fix for CVE-2010-3904 has been\u00a0back ported\u00a0to all gentoo-source versions that are currently supported. (2.6.32-rX, 2.6.34-rX and 2.6.35-rX)<\/p>\n<p>This fix is now released in the following genpatches:<\/p>\n<p>genpatches-2.6.35-12<br \/>\ngenpatches-2.6.34-14<br \/>\ngenpatches-2.6.32-25<\/p>\n<p>The following newly released gentoo-sources kernels contain the patch:<\/p>\n<p>gentoo-sources-2.6.35-r11<br \/>\ngentoo-sources-2.6.34-r12<br \/>\ngentoo-sources-2.6.32-r20<\/p>\n<p>The following stable request bugs have been filed for these kernels:<\/p>\n<p><a href=\"http:\/\/bugs.gentoo.org\/show_bug.cgi?id=341833\">bug #341833<\/a> for gentoo-sources-2.6.32-r20<br \/>\n<a href=\"http:\/\/bugs.gentoo.org\/show_bug.cgi?id=341831\">bug #341831<\/a> for gentoo-sources-2.6.34-r12<\/p>\n<p>Please note that no stable request has been filed for 2.6.35-r11, as we wait for the prerequisite 30 days for the new baselayout to be requested to be stabled before we can do so. \u00a0 If you are running a 2.6.35 gentoo-source kernel, please upgrade to the latest version. Note that as of this post, upstream has not released new vanilla kernel versions containing the fix.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Attention all Media, Gentoo users and my fellow Gentoo devs: A new \u00a0kernel vulnerability has been reported and the gentoo bug has been filed. Within 4 hours of this filing, the kernel team has released the following: The fix for&hellip; <br \/><a class=\"read-more-button\" href=\"https:\/\/www.mpagano.com\/blog\/?p=146\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-146","post","type-post","status-publish","format-standard","hentry","category-gentoo"],"_links":{"self":[{"href":"https:\/\/www.mpagano.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mpagano.com\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mpagano.com\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mpagano.com\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mpagano.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=146"}],"version-history":[{"count":1,"href":"https:\/\/www.mpagano.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/146\/revisions"}],"predecessor-version":[{"id":147,"href":"https:\/\/www.mpagano.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/146\/revisions\/147"}],"wp:attachment":[{"href":"https:\/\/www.mpagano.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=146"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mpagano.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=146"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mpagano.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}