Jeff Johnson wrote:
For example, the content in changelogs, if not hardened by digest and/or
signature,
might be part of a socially engineered exploit to disguise a maliciously
modified
package. It's very hard not believe what you read.
/subliminal messages on
RPM IS GOOD FOR YOU, RPM IS GOOD FOR YOU, RPM IS GOOD FOR YOU...
/subliminal messages off
Sorry, couldn't resist. ;)
Read ya, Phil
--
Philipp Knirsch | Tel.: +49-711-96437-470
Development | Fax.: +49-711-96437-111
Red Hat GmbH | Email: Phil Knirsch <phil@xxxxxxxxx>
Hauptstaetterstr. 58 | Web: http://www.redhat.de/
D-70178 Stuttgart
Motd: You're only jealous cos the little penguins are talking to me.