Once upon a time, Reindl Harald <h.reindl@xxxxxxxxxxxxx> said: > don't get me wrong but you are talking bullshit Put up or shut up. > you can't download whatever you like to do in any random situation > and excutue it like in a sehll - if you have only *one command* through > a web application you need to achieve that this single command triggers > the whole attack surface down to the critical component giving you > root access If you can't explain how a non-privileged binary can result in a privilege escalation, then you are wrong. You need to go up-thread and read what I was responding to and show how it is wrong. -- Chris Adams <linux@xxxxxxxxxxx> -- devel mailing list devel@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct