Once upon a time, Ricky Zhou <ricky@xxxxxxxxxxxxxxxxx> said: > I might be wrong on this, but wouldn't the attacker need to trick > yum/packagekit into using the malicious repo first? I didn't think that > was allowed for non-root users. 1.5 words: NetworkManager. Think about it. -- Chris Adams <cmadams@xxxxxxxxxx> Systems and Network Administrator - HiWAAY Internet Services I don't speak for anybody but myself - that's enough trouble. -- fedora-devel-list mailing list fedora-devel-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/fedora-devel-list