doctorn, 1 year ago You assume this malicious code is lame enough not to gain root itself with a modified su.
You assume this malicious code is lame enough not to gain root itself with a modified su.