• @kata1yst@sh.itjust.works
    link
    fedilink
    324 months ago

    Yeah, and to exploit it you need ring0 access in the kernel.

    In other words, this isn’t an attack vector, it’s an escalation path. It escalates past the kernel, which is terrible to be sure, but if a hacker manages to get that deep in the first place, your system is already fucked.