Reply 20 of 31, by r.cade
It looks like it would be very hard to set up a circumstance that could use these exploits, especially remotely. If you have to be on the machine as root to do it, then you are already on the machine as root. You would have to have intimate knowledge of the specific machine configuration and be quite adept at kernel programming it would seem.