Make gdebi harder to use (was: Disable support for adding repositories)
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
apturl (Ubuntu) |
Fix Released
|
High
|
Michael Vogt | ||
gdebi (Ubuntu) |
Won't Fix
|
High
|
Jamie Strandboge |
Bug Description
Binary package hint: apturl
I think the ability to add repositories to the apt sources should not be enabled/included by default. This is potentially a huge security risk.
E.g. a user can be easily seduced to enable some repository to install the newest coolest most beautiful screensaver from it, but later a package is added to that repository with malicious code that replaces one of the ubuntu packages on the system.
Apturl provides some great functionality, but it should encourage people to install software from the official repositories, not make it supereasy to enable all kinds of untrusted third party repositories.
Wether you agree with this or not, I think it would be good to at least discuss this on ubuntu-devel before enabling this feature.
Related branches
Changed in apturl: | |
assignee: | nobody → mvo |
Changed in gdebi (Ubuntu): | |
status: | Incomplete → Won't Fix |
I think apturl should make it easy to install from 3rd party repositories. The ability to add apt sources is one of my favorite features. apturl asks if you want to install the program, makes you enter your password, does the install, and then asks if you want to keep the repo or not. If you don't want to keep it around then it gets removed.
That's a lot of hoops you have to jump through as it is. The piece that appears to be missing to me is insight into any dependencies getting installed along with the package that is desired. A check against a list of key packages that no 3rd party repo should touch could be a good way to limit abuse.