No, if you read the article, Zenbleed for example, which is fixed with these, is completely possible to do it remotely.Are these the type of "vulnerabilities" where an attacker basically needs to already have access to your system to take advantage of them?
If not, could someone more knowledgeable on this type of thing give an example scenario of how an unsuspecting user could fall victim to one of these vulnerabilities?