Am Freitag, 9. März 2012 schrieb Greg Freemyer: > On Thu, Mar 8, 2012 at 2:06 PM, Sean Thomas Caron <scaron@xxxxxxxxx> wrote: > > Hi all, > > > > We're currently using Linux 3.0.12 with Cristoph's > > xfs-bulletproof-sync patch and it seems to be working very well for > > us. Unfortunately this kernel is vulnerable to the recent > > CVE-2012-0056 no permission checking on writes to /proc/(pid)/mem > > local root exploit, so we've got to leave it behind. > > > > I see that the newest recommended stable kernel on kernel.org is > > 3.2.9. > > Sean, > > You do appreciate 3.0 has been designated a long-term kernel by the > kernel.org team and will get kernel.org support for 2 years. 3.2 is > not a long-term kernel, so support drops from kernel.org more or less > when 3.3 comes out. > > 3.2 support will come from the distributors of course, but I don't know > if any of the major releases are based on 3.2. AFAIR Ubuntu 12.04 as well as Debian Wheezy will use kernel 3.2. -- Martin 'Helios' Steigerwald - http://www.Lichtvoll.de GPG: 03B0 0D6C 0040 0710 4AFA B82F 991B EAAC A599 84C7 _______________________________________________ xfs mailing list xfs@xxxxxxxxxxx http://oss.sgi.com/mailman/listinfo/xfs