From https://secunia.com/advisories/50310/ : Description A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to a use-after-free error in the "madvise_remove()" function and can be exploited to dereference already freed memory. Solution Update to version 3.0.37, 3.2.23, 3.4.5, or apply fix in the GIT repository for version 2.6.x. Provided and/or discovered by Andy Lutomirski Original Advisory Kernel.org: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=9ab4233dd08036fe34a89c7dc6f47a8bf2eb29eb http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.0.37 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.2.23 http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.5 Red Hat: https://bugzilla.redhat.com/show_bug.cgi?id=849734
There are no longer any 2.x or <3.4.5 kernels available in the repository with the exception of sys-kernel/xbox-sources which is unsupported by security.