I've just seen some reports about a new kernel bug (Linux NULL pointer dereference due to incorrect proto_ops initializations http://archives.neohapsis.com/archives/fulldisclosure/2009-08/0174.html ). Obviously the SuSE security guys will be looking at this, but I was looking to see if there was anything I could do to protect my systems before a new kernel comes out. The only exploit I have seen does not work on SuSE 11.1 because /usr/bin/pulseaudio is not setuid, so that is good news. There are suggestions that running sysctl -w vm.mmap_min_addr=65536 gives protection, but there also suggestions that this protection is flawed. Also I think it breaks 16-bit applications under wine but I can live with that. Does anyone have any comments? Bob Vickers -- To unsubscribe, e-mail: opensuse-security+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security+help@opensuse.org