From c74d2229e62134c55f14a2e49761a27adb02bbfc Mon Sep 17 00:00:00 2001 From: fmaury Date: Tue, 8 Nov 2022 09:21:35 +0000 Subject: [PATCH] Update links after debian deleted bullseye branch --- posts/debootscrap.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/posts/debootscrap.md b/posts/debootscrap.md index 5d65742..6067400 100644 --- a/posts/debootscrap.md +++ b/posts/debootscrap.md @@ -52,13 +52,13 @@ First of, there is a check to ensure we are running it with UID 0[^checkUID]. This can be bypassed in several documented ways, including using `fakeroot`, which overloads some libc calls, using `LD_PRELOAD`. An other, less hacky, way is to run the program in a user namespace. -[^checkUID]: https://salsa.debian.org/installer-team/debootstrap/-/blob/bullseye/debootstrap#L586 +[^checkUID]: https://salsa.debian.org/installer-team/debootstrap/-/blob/90747310f8722ca7e3b6a13af3f0c0e76cf7dd74/debootstrap#L605 Unfortunately, this is not sufficient to run `debootstrap`, since it performs another check consisting of trying to create a "/dev/null" node[^checkNode]. This is more problematic since nodes cannot be created from a user namespace, as this would create a easy way of escaping the namespace. -[^checkNode]: https://salsa.debian.org/installer-team/debootstrap/-/blob/bullseye/functions#L1619 +[^checkNode]: https://salsa.debian.org/installer-team/debootstrap/-/blob/90747310f8722ca7e3b6a13af3f0c0e76cf7dd74/functions#L1664 As it seems, though, there is a way to build an unprivileged Debian root filesystem that is even built into deboostrap, using the installation variant