Re: Not enough info, so no point



On 06/03/11 09:09, Sam Varshavchik wrote:
JD writes:

A user process (such as yum), even with root privs,
CANNOT JUMP OUT OF THE BOUNDARIES OF IT'S ROOT,
NAMELY (for example) /mnt/f15

Umm, that's not true. The chroot(2) man page has a nice explanation of
how a root userid can trivially escape a chroot jail.

So there is no danger that yum executed within a chrooted environment
will affect the enclosing host's yum database (in this case F14).

Nope, that's definitely possible.

We are not talking about hacking!!
we are talking about normal user interaction,
and in this case, limited to running yum update.
There is absolutely no danger in doing so -
been there and done it.
--
users mailing list
users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines