The 4 exploits titled "x86 assembly that ..." don't actually exploit any
Linux security holes that need fixing. They're just position-independent
assembler code to do the syscalls needed to perform whatever operation
they do, _assuming_ you already have the appropriate rights.
The expected use is to plug the bit of asm code in some existing buffer
overflow exploit.
-- Roger Espel Llima, espel@llaic.u-clermont1.fr http://www.eleves.ens.fr:8080/home/espel/index.html- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.altern.org/andrebalsa/doc/lkml-faq.html