Once upon a time, Richard Hughes <hughsient@xxxxxxxxx> said: > 2009/11/19 Chris Adams <cmadams@xxxxxxxxxx>: > > Once upon a time, Ricky Zhou <ricky@xxxxxxxxxxxxxxxxx> said: > >> I might be wrong on this, but wouldn't the attacker need to trick > >> yum/packagekit into using the malicious repo first? I didn't think that > >> was allowed for non-root users. > > > > 1.5 words: NetworkManager. Think about it. > > 2 words: Package signing. > > If the key is different to the one that was preciously imported, you > need the root password. 2 words: replay attack. So there are no packages in releases/12/Everything that have privilege escalation bugs? All I have to do is wait for one to be found, and I have a signed path to root. Even if the package is fixed in updates, I just have to have a custom updates repo without it. -- Chris Adams <cmadams@xxxxxxxxxx> Systems and Network Administrator - HiWAAY Internet Services I don't speak for anybody but myself - that's enough trouble. -- fedora-devel-list mailing list fedora-devel-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/fedora-devel-list