A new Linux vulnerability known as 'Looney Tunables' enables local attackers to gain root privileges by exploiting a buffer overflow weakness in the GNU C Library's ld.so dynamic loader.
It's certainly why it is being used to build browsers and OSs now. Those are places were memory management problems are a huge problem. It probably doesn't make sense for every match 3 game to be made in Rust, but when errors cause massive breaches or death, it's a lot safer than C++, taking human faulability into account.
Sometimes I wonder if vulnerability research teams do more harm than good. This vulnerability became possible due to a commit in 2021, but no one has seen it exploited before. But, now that it's been widely announced, it "creates" a new surface vector for malicious actors to attack that previously wouldn't have been known to exist.
That being said, I know that more sophisticated attackers have entire arsenals of vulnerabilities not yet publicly discovered that they keep close to their chest, and this could've been one of them. Cybersecurity is an exhausting field.
Typically there's a period of responsible disclosure to give the software maintainer an opportunity to fix it before it's widely announced. After that period is up or the fix has been released the vulnerability discoverer is able to announce it and take credit for finding it.
It's not only the good guys that find vulnerabilities. There're many states and companies (selling to those governments) as well as regular criminal organizations paying people for vulnerabilities and exploits.
If the issue wasn't reported, it is likely that it would have been found by someone else at some point. It might even be known already, but just not reported.