On 06/03/2011 05:09 PM, Sam Varshavchik wrote: > JD writes: > >> A user process (such as yum), even with root privs, >> CANNOT JUMP OUT OF THE BOUNDARIES OF IT'S ROOT, >> NAMELY (for example) /mnt/f15 > > Umm, that's not true. The chroot(2) man page has a nice explanation of > how a root userid can trivially escape a chroot jail. > >> So there is no danger that yum executed within a chrooted environment >> will affect the enclosing host's yum database (in this case F14). > > Nope, that's definitely possible. > My caution maybe well founded, so I will have to do some experimenting first. Thanks for the feedback folks. -- users mailing list users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe or change subscription options: https://admin.fedoraproject.org/mailman/listinfo/users Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines