On 06/03/11 09:09, Sam Varshavchik wrote:
JD writes:
> A user process (such as yum), even with root privs,
> CANNOT JUMP OUT OF THE BOUNDARIES OF IT'S ROOT,
> NAMELY (for example) /mnt/f15
Umm, that's not true. The chroot(2) man page has a nice explanation of
how a root userid can trivially escape a chroot jail.
> So there is no danger that yum executed within a chrooted environment
> will affect the enclosing host's yum database (in this case F14).
Nope, that's definitely possible.
We are not talking about hacking!!
we are talking about normal user interaction,
and in this case, limited to running yum update.
There is absolutely no danger in doing so -
been there and done it.