Once upon a time, Ricky Zhou <ri...@fedoraproject.org> said:
> I might be wrong on this, but wouldn't the attacker need to trick 
> yum/packagekit into using the malicious repo first?  I didn't think that 
> was allowed for non-root users.

1.5 words: NetworkManager.  Think about it.

-- 
Chris Adams <cmad...@hiwaay.net>
Systems and Network Administrator - HiWAAY Internet Services
I don't speak for anybody but myself - that's enough trouble.

-- 
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list

Reply via email to