Hello, did I miss something or is this [1][2] still unpatched in openSUSE 12.3 and 13.1 kernels? After: zypper in linux-sources and: grep -r -e "if (get_compat_timespec(&ktspec, timeout))" /usr/src/* there was the expected output for the _unpatched_ kernel. Much worse, the "CONFIG_X86_X32=y" (for openSUSE 13.1) and "CONFIG_X86_32=y" (for openSUSE 12.3) seems to be available in *every* kernel configuration. Is there a chance to use any kernel parameters for deactivating this problem? I didn't find any solution. Manually patching the kernel is no option for me. In the case of patching myself and the assumption that it will not be fixed in the repositories I will probably end up repairing this after every kernel update. Kind regards, Stefan References: [1] http://www.openwall.com/lists/oss-security/2014/01/31/2 [2] https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2... -- To unsubscribe, e-mail: opensuse-kernel+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse-kernel+owner@opensuse.org