Circulating in the news.
3 Likes
Well, to use the vulnerability an attacker has to already be root on your system, in which case you are already f***ed. The only possible purpose of using it I can imagine is to ensure future root access if something changes on the system.