Not enough info, so no point

n2xssvv.g02gfr12930 n2xssvv.g02gfr12930 at ntlworld.com
Fri Jun 3 19:21:17 UTC 2011


On 06/03/2011 06:18 PM, JD wrote:
> On 06/03/11 09:09, Sam Varshavchik wrote:
>> JD writes:
>>
>>> A user process (such as yum), even with root privs,
>>> CANNOT JUMP OUT OF THE BOUNDARIES OF IT'S ROOT,
>>> NAMELY (for example) /mnt/f15
>>
>> Umm, that's not true. The chroot(2) man page has a nice explanation of
>> how a root userid can trivially escape a chroot jail.
>>
>>> So there is no danger that yum executed within a chrooted environment
>>> will affect the enclosing host's yum database (in this case F14).
>>
>> Nope, that's definitely possible.
>>
> We are not talking about hacking!!
> we are talking about normal user interaction,
> and in this case, limited to running yum update.
> There is absolutely no danger in doing so -
> been there and done it.

Well I'll try a few harmless things first, just to gain some confidence. 
Other than that I'm sure I'll manage fine thanks folks.


More information about the users mailing list