this post was submitted on 07 May 2026
58 points (98.3% liked)

Linux

13626 readers
1357 users here now

A community for everything relating to the GNU/Linux operating system (except the memes!)

Also, check out:

Original icon base courtesy of lewing@isc.tamu.edu and The GIMP

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] Solemarc@lemmy.world 18 points 6 days ago

It is a bit eye rolling "LOOK AT THIS DISASTER OF AN EXPLOIT!!!" *Requires physical access to the machine

But the major issue is that if you have some other exploit that gets you RCE or a shell you can then use these exploits to pwn someone and we have RCE's and shell exploits come around all the time.