Patches for newer kernels are out.
And we actually monitor upstream, so the way it works for Proxmox 3.x is that issue first raised on security mailing lists, then it gets fixed in VZ kernels and after that pve kernel gets created.
It might not always be this sequence, but usually it is. We often catch issues at security mailing list level, and patch issue even before it hits OpenVZ.
Or we would wait for OpenVZ, but when we do patch for OpenVZ -- we would also do one for proxmox 3.x right away.
With Proxmox 4.x it is security mailing lists -> ubuntu -> proxmox 4.x from what we understand, and we are planning to follow the same strategy.
Anyway -- all the kernels should be recognizable now.