On Thu, Jun 18, 2009 at 11:02:22AM -0400, Matthias Clasen wrote: > The retained authorization is only valid for the subject that obtained > it, which will typically be a process (identified by process id and > start time) or a canonical bus name. And your malware does not have > either. Can the malware inject code into the process which gained the authentication (eg. using ptrace)? Rich. -- Richard Jones, Emerging Technologies, Red Hat http://et.redhat.com/~rjones virt-p2v converts physical machines to virtual machines. Boot with a live CD or over the network (PXE) and turn machines into Xen guests. http://et.redhat.com/~rjones/virt-p2v -- fedora-devel-list mailing list fedora-devel-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/fedora-devel-list