Adam Williamson wrote: > # There must be no known remote code execution vulnerability which could > be exploited during installation or during use of a live image shipped > with the release If the installer would download packages during the installation, and an attacker could trick it into downloading and installing malicious code that would run as root once the installed system booted, would that match this criterion? Because then I'd say yes, let's make this an alpha release criterion â and finally do something about bug 998 before F16 alpha. BjÃrn Persson
Attachment:
signature.asc
Description: This is a digitally signed message part.
-- devel mailing list devel@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/devel