• Aatube@kbin.melroy.org
    link
    fedilink
    arrow-up
    3
    ·
    edit-2
    9 months ago

    Under the right circumstances this interference could potentially enable a malicious actor to break sshd authentication and gain unauthorized access to the entire system remotely. —Wikipedia, sourced to RedHat

    Of course, the authentication bypass allows remote code execution.