Hi, There is an interesting article on LWN [1] about a recent kernel vulnerability. Apparently it cannot be used in a real-world situation (see section "Further requirements for a successful exploit" and comments), but I still think it's a nice and easy to follow example. [1] http://lwn.net/Articles/543273/ Have fun, Vlad