Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20130618164125.GA21737@inutil.org>
Date: Tue, 18 Jun 2013 18:41:25 +0200
From: Moritz Muehlenhoff <jmm@...ian.org>
To: Kurt Seifried <kseifried@...hat.com>
Cc: oss-security@...ts.openwall.com
Subject: Re: Thoughts on a vuln/CVE?

On Tue, Jun 18, 2013 at 12:44:09AM -0600, Kurt Seifried wrote:
> Also part of my thought process is that (for example) this would be a
> good configuration to check for and ensure is disabled, something for
> SCAP for example or the Debian security guide (e.g. a generic "make
> sure all enabled repos are actually working as expected").

Debian doesn't endorse any external repository. During package installation
the pre/post installation scripts run with root privs. As such, if you
enable a repository you trust the people behind that repository with
the equivalent to root access to your system anyway.

Cheers,
        Moritz

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.