Unprivileged attackers can get a root shell by exploiting an authentication bypass vulnerability in the polkit auth system service installed by default on many modern Linux distributions. […]
This post appeared first on Bleeping Computer
Author: Sergiu Gatlan