It is a zero day vulnerability, but the bad guy has to have access to your machine (either local or remote) before he can use it. It’s not a vulnerability that allows any random schmoe to log into your computer unless he already has a way to do it. It just allows him to jack up his access level if he’s already present.
FrankCox
7
Related topics
| Topic | Replies | Views | Activity | |
|---|---|---|---|---|
| CopyFail (CVE-2026-31431): Patches Now Available for Rocky Linux | 2 | 4163 | May 8, 2026 | |
| Dirty Frag vulnerability reported for Linux kernel CVE-2026-43284, CVE-2026-43500 | 10 | 3789 | May 14, 2026 | |
| Rocky 8.10 - CVE-2025-38352 | 24 | 1770 | November 21, 2025 | |
| The Further Experiments of a Vacuous Experimenter | 9 | 695 | August 25, 2023 | |
| Some errata missing in comparison with RHEL and AlmaLinux | 16 | 4360 | August 25, 2023 |