@astrid@fedi.astrid.tech Oh that would be spooky OwO At least said process would need write permissions over foo, which, if foo is owned by root and other users DON'T have write permissions over it, would require root access (and if it has root access no point in doing that). This is typically the case for programs in like /bin or whatever. But if foo is a user file or has too much permissions, then you would only need to compromise that user and then that would be pretty dangerous I think.
Conversation
Notices
-
Embed this notice
Sharkitty :sparkletrans: (sharkitty@transgirl.cafe)'s status on Monday, 06-May-2024 04:55:32 JST Sharkitty :sparkletrans: - clacke likes this.
-
Embed this notice
malevolent dictator for life (astrid@fedi.astrid.tech)'s status on Monday, 06-May-2024 04:55:33 JST malevolent dictator for life so like, when you run sudo ./foo, while entering the password in, another process *could* just swap out foo for another executable right