Why are these relevant on the arch-security list? Are either of these exploitable, even in theory? On Sun, 21 Dec 2014, Xan wrote: > Hi, > > Perhaps someone could be insterested in those: > http://soylentnews.org/article.pl?sid=14/12/21/1343258 > > You're welcome, > -- Scott Lawrence