The memory corruption vulnerability in a policy component installed by default on most Linux distributions allows any user to become root. Researchers have already reproduced the exploit.
from Dark Reading https://ift.tt/3o1TB9s
via IFTTT
The memory corruption vulnerability in a policy component installed by default on most Linux distributions allows any user to become root. Researchers have already reproduced the exploit.
from Dark Reading https://ift.tt/3o1TB9s
via IFTTT