On 06/03/11 09:09, Sam Varshavchik wrote: > JD writes: > >> A user process (such as yum), even with root privs, >> CANNOT JUMP OUT OF THE BOUNDARIES OF IT'S ROOT, >> NAMELY (for example) /mnt/f15 > > Umm, that's not true. The chroot(2) man page has a nice explanation of > how a root userid can trivially escape a chroot jail. > >> So there is no danger that yum executed within a chrooted environment >> will affect the enclosing host's yum database (in this case F14). > > Nope, that's definitely possible. > We are not talking about hacking!! we are talking about normal user interaction, and in this case, limited to running yum update. There is absolutely no danger in doing so - been there and done it. -- users mailing list users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe or change subscription options: https://admin.fedoraproject.org/mailman/listinfo/users Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines