A local attacker can exploit multiple vulnerabilities in the Linux Kernel to bypass security measures.
Initial creation