2009/11/19 Chris Adams <cmad...@hiwaay.net>:
> Once upon a time, Ricky Zhou <ri...@fedoraproject.org> said:
>> I might be wrong on this, but wouldn't the attacker need to trick
>> yum/packagekit into using the malicious repo first?  I didn't think that
>> was allowed for non-root users.
>
> 1.5 words: NetworkManager.  Think about it.

2 words: Package signing.

If the key is different to the one that was preciously imported, you
need the root password.

Richard.

-- 
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list

Reply via email to