Researchers from Malwarebytes said that it had identified a malware installer in the wild that exploits the vulnerability.
Hackers can modify a sudoers file, this determines, among other things, who is allowed to get root permissions in a Unix shell, and how.
Read MoreSelect your language