Ja jsem zkousel na CPU s podporou NX flag a tento exploit se bez problemu dostal na ucet roota
http://sota.gen.nz/compat2/robert_you_suck.c
Tady je puvodni zdroj: http://sota.gen.nz/compat2/
All well and good, but this bug was patched in 2.6.22.7. They fixed the bug by reloading (and thus zero-extending) the original value of eax from the stack. But… strangely enough, in the LOAD_ARGS32 macro that was responsible for this reloading, I couldn't actually see a specific reloading of eax anymore: