I read the exploit and thought it meant "privilege escalation allowing to access every file that root can access".
Is it really "only" specific to SSH? I thought that reading SSH private keys was just a proof-of-concept to show that the exploit allow to read any file root can read?
I gotta say: there are so man privilege escalation exploits lately that it's hard to keep track.
I read the exploit and thought it meant "privilege escalation allowing to access every file that root can access".
Is it really "only" specific to SSH? I thought that reading SSH private keys was just a proof-of-concept to show that the exploit allow to read any file root can read?
I gotta say: there are so man privilege escalation exploits lately that it's hard to keep track.