New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
List of xbps-triggers that is NOT safe to be run from outside of chroot #23262
Comments
How else would we make a
|
Issues become stale 90 days after last activity and are closed 14 days after that. If this issue is still relevant bump it or assign it. |
Issues become stale 90 days after last activity and are closed 14 days after that. If this issue is still relevant bump it or assign it. |
Issues become stale 90 days after last activity and are closed 14 days after that. If this issue is still relevant bump it or assign it. |
Issues become stale 90 days after last activity and are closed 14 days after that. If this issue is still relevant bump it or assign it. |
In light of #23239,
I look into some
xbps-triggers
, and I think those triggers aren't safe to be run from outside of chroot:execve(2)
exit with 126,/bin/sh
will search next commands in hosts, and use it instead of chroot's executable.system-accounts
: check if the uservoid-packages/srcpkgs/xbps-triggers/files/system-accounts
Line 112 in d148c44
void-packages/srcpkgs/xbps-triggers/files/system-accounts
Line 29 in d148c44
void-packages/srcpkgs/xbps-triggers/files/system-accounts
Line 113 in d148c44
void-packages/srcpkgs/xbps-triggers/files/system-accounts
Line 31 in d148c44
groupadd -R -P
anduseradd -R -P
, don't know if they're portable). This one is very problematic becausebase-files
uses this triggersThought, @void-linux/pkg-committers @ericonr
The text was updated successfully, but these errors were encountered: