Re: Local users get to play root?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 2009-11-19 10:23:53 AM, Till Maas wrote:
> So at least one major security protection measure is not in place and
> attackers can create their own repositories with signed packages that
> have well known security flaws, e.g. a package with a bad setuid root
> binary, and install it, if it is not already installed in a newer
> version.
I might be wrong on this, but wouldn't the attacker need to trick 
yum/packagekit into using the malicious repo first?  I didn't think that 
was allowed for non-root users.

Note that even if the repomd.xml files were signed, it'd be easy for an 
attacker to just take an old one with a valid signature and host a repo 
with outdated packages.  I thought metalink 
(https://mirrors.fedoraproject.org/metalink?repo=updates-released-f12&arch=x86_64) 
over https was supposed to address the problem of outdated repos though.

Thanks,
Ricky

Attachment: pgppdFTqJVHz0.pgp
Description: PGP signature

-- 
fedora-devel-list mailing list
fedora-devel-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-devel-list

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux