|
Message-ID: <20130618164125.GA21737@inutil.org> Date: Tue, 18 Jun 2013 18:41:25 +0200 From: Moritz Muehlenhoff <jmm@...ian.org> To: Kurt Seifried <kseifried@...hat.com> Cc: oss-security@...ts.openwall.com Subject: Re: Thoughts on a vuln/CVE? On Tue, Jun 18, 2013 at 12:44:09AM -0600, Kurt Seifried wrote: > Also part of my thought process is that (for example) this would be a > good configuration to check for and ensure is disabled, something for > SCAP for example or the Debian security guide (e.g. a generic "make > sure all enabled repos are actually working as expected"). Debian doesn't endorse any external repository. During package installation the pre/post installation scripts run with root privs. As such, if you enable a repository you trust the people behind that repository with the equivalent to root access to your system anyway. Cheers, Moritz
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.