GRUB2 vulnerability

Circulating in the news.


Well, to use the vulnerability an attacker has to already be root on your system, in which case you are already f***ed. The only possible purpose of using it I can imagine is to ensure future root access if something changes on the system.