• mox@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    1 month ago

    No, it does not mean you would need to do that.

    The more likely scenario is an attacker using another vulnerability to gain a foothold for this one. Chaining attacks is a very common technique. (What “trade” are you in, exactly?)

    Apply the mitigations when they become available, folks.