logoalt Hacker News

collinfunktoday at 8:25 AM1 replyview on HN

Well the TOCTOU issues do not require you to run untrusted scripts to be exploited. Another user on your system can use a legitimate command that you may run to make changes to files they shouldn’t be able to, or further escalate privileges.


Replies

IshKebabtoday at 11:13 AM

Fair point. Though tbh I still think the user-isolation security for Linux is only really suited for the University/company threat model, where you generally trust users not to actually use exploits because they would get expelled/fired.

If you allow a completely untrusted user onto your system I think your chances of staying secure are low.

show 1 reply