I'm concerned that a malicious program that I install on the user level could then trick me into somehow giving up my sudo password through this method. In malicious hands this could probably be used to edit aliases or append a directory of the attackers choosing to the beginning of the $PATH. My understanding of user permissions is that any process spawned by my user will then have read/write permissions to this file. I have the C++ extensions 1.14.5 installed, WSL extension 17.6M installed. "text": "handle SIG34 nostop pass noprint", "description": "Catch an exception when thrown", "description": "Provide backtrace to all threads", "text": "-gdb-set disassembly-flavor intel", "description": "Set Disassembly Flavor to Intel", "description": "Enable pretty-printing for gdb",
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |