Functionally, it acts like an app store for power users and developers, but without the graphical interface. You simply type ...
The bug lets attackers with local access elevate to “system” or destabilize machines through unsafe privilege file operations ...