Well, the hole becomes less serious when exploited, but I wouldn't say it was
"plugged", really... Now, successfully exploitation just gets you the ability
to create raw sockets instead of full root... But, raw sockets aren't really
something you want to give to an untrusted user to play with, either...
But, yeah, it'd still be better than giving them root, so yeah, why isn't this
done if it's possible?