This simpilfication is just usefull for bufferoverruns,
which are exploitable after the execution of a SUID
program.
Please, send your comments to thomas@suse.de, because
I'm not subscribed to this mailinglist... thanks.
Bye,
Thomas
-- Thomas Biege, SuSE GmbH, Schanzaeckerstr. 10, 90443 Nuernberg E@mail: thomas@suse.de Function: Security Support & Auditing issue a "finger thomas@suse.de | pgp -fka" for my public pgp key
- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/