2009/11/19 Chris Adams <cmadams@xxxxxxxxxx>: > Once upon a time, Ricky Zhou <ricky@xxxxxxxxxxxxxxxxx> said: >> I might be wrong on this, but wouldn't the attacker need to trick >> yum/packagekit into using the malicious repo first? I didn't think that >> was allowed for non-root users. > > 1.5 words: NetworkManager. Think about it. 2 words: Package signing. If the key is different to the one that was preciously imported, you need the root password. Richard. -- fedora-devel-list mailing list fedora-devel-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/fedora-devel-list