Am 2009-11-18 20:20, schrieb Richard Hughes:
2009/11/18 Casey Dahlin<cdahlin@xxxxxxxxxx>:
By the admin's first opportunity to change the settings the box could already be rooted.
I'm not sure how you can root a computer from installing signed
content by a user that already has physical access to the machine.
You install software with a known buffer overflow before it is fixed and
exploit it. More software = more chances to exploit. Bingo!
--
fedora-devel-list mailing list
fedora-devel-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-devel-list