Once upon a time, Ricky Zhou <ricky(a)fedoraproject.org> said:
I might be wrong on this, but wouldn't the attacker need to trick
yum/packagekit into using the malicious repo first? I didn't think that
was allowed for non-root users.
1.5 words: NetworkManager. Think about it.
--
Chris Adams <cmadams(a)hiwaay.net>
Systems and Network Administrator - HiWAAY Internet Services
I don't speak for anybody but myself - that's enough trouble.