On 06/03/2011 06:18 PM, JD wrote: > On 06/03/11 09:09, Sam Varshavchik wrote: >> JD writes: >> >>> A user process (such as yum), even with root privs, >>> CANNOT JUMP OUT OF THE BOUNDARIES OF IT'S ROOT, >>> NAMELY (for example) /mnt/f15 >> >> Umm, that's not true. The chroot(2) man page has a nice explanation of >> how a root userid can trivially escape a chroot jail. >> >>> So there is no danger that yum executed within a chrooted environment >>> will affect the enclosing host's yum database (in this case F14). >> >> Nope, that's definitely possible. >> > We are not talking about hacking!! > we are talking about normal user interaction, > and in this case, limited to running yum update. > There is absolutely no danger in doing so - > been there and done it. Well I'll try a few harmless things first, just to gain some confidence. Other than that I'm sure I'll manage fine thanks folks. -- users mailing list users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe or change subscription options: https://admin.fedoraproject.org/mailman/listinfo/users Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines