Once upon a time, Ricky Zhou <ri...@fedoraproject.org> said: > I might be wrong on this, but wouldn't the attacker need to trick > yum/packagekit into using the malicious repo first? I didn't think that > was allowed for non-root users.
1.5 words: NetworkManager. Think about it. -- Chris Adams <cmad...@hiwaay.net> Systems and Network Administrator - HiWAAY Internet Services I don't speak for anybody but myself - that's enough trouble. -- fedora-devel-list mailing list fedora-devel-list@redhat.com https://www.redhat.com/mailman/listinfo/fedora-devel-list