On 06/03/2011 06:18 PM, JD wrote:
On 06/03/11 09:09, Sam Varshavchik wrote:
JD writes:
A user process (such as yum), even with root privs, CANNOT JUMP OUT OF THE BOUNDARIES OF IT'S ROOT, NAMELY (for example) /mnt/f15
Umm, that's not true. The chroot(2) man page has a nice explanation of how a root userid can trivially escape a chroot jail.
So there is no danger that yum executed within a chrooted environment will affect the enclosing host's yum database (in this case F14).
Nope, that's definitely possible.
We are not talking about hacking!! we are talking about normal user interaction, and in this case, limited to running yum update. There is absolutely no danger in doing so - been there and done it.
Well I'll try a few harmless things first, just to gain some confidence. Other than that I'm sure I'll manage fine thanks folks.