Unprivileged attackers can get a root shell by exploiting an authentication bypass vulnerability in the polkit auth system service installed by default on many modern Linux distributions. […] – Read More – BleepingComputer


By |2021-06-11T12:19:02-04:00June 11th, 2021|