• mox@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    7
    ·
    edit-2
    5 months ago

    No, it does not mean you would need to do that.

    The more likely scenario is an attacker using another vulnerability, either in the OS itself or in a vendor-supplied component like a driver or anti-cheat module, to gain a foothold for this one. Chaining exploits is a very common technique. (What “trade” are you in, exactly?)

    Apply the mitigations when they become available for your hardware, folks.