!UNVBThoJtlIiVwiDjU:nixos.org

Staging

345 Members
Staging merges | Find currently open staging-next PRs: https://github.com/NixOS/nixpkgs/pulls?q=is%3Apr+sort%3Aupdated-desc+head%3Astaging-next+head%3Astaging-next-21.05+is%3Aopen114 Servers

Load older messages


SenderMessageTime
15 Jan 2026
@k900:0upti.meK900OK I'm skipping that test22:28:03
@k900:0upti.meK900I give up22:28:05
@k900:0upti.meK900 https://hydra.nixos.org/build/318960699 22:28:14
@k900:0upti.meK900Same failure on x86_6422:28:19
@k900:0upti.meK900I've skipped the test22:28:24
@hexa:lossy.networkhexavia arrow-cpp ig22:28:29
@hexa:lossy.networkhexafck22:28:33
@k900:0upti.meK900People that care about google bigtable cpp client can fix it22:28:34
@necoro:nixos.dev@necoro:nixos.dev joined the room.23:41:12
@necoro:nixos.dev@necoro:nixos.dev left the room.23:42:49
16 Jan 2026
@marcel:envs.net@marcel:envs.net left the room.00:50:34
@glepage:matrix.orgGaétan Lepage Would you be fine with tanking a protobuf change in staging-next at this time? 14:14:21
@k900:0upti.meK900Probably not14:14:46
@k900:0upti.meK900How bad is it14:14:48
@glepage:matrix.orgGaétan Lepage

In terms of rebuilds? A few thousands probably.

In terms of severity, it's not security-related. It fixes a specific issue that we discovered on cudaSupport when updating onnxruntime (https://github.com/NixOS/nixpkgs/pull/450587#discussion_r2698215974).

I can target staging if needed.

14:17:42
@k900:0upti.meK900No, rebuild wise it is a lot more than that14:18:59
@k900:0upti.meK900I want to know what the impact is14:19:06
@glepage:matrix.orgGaétan Lepage For now I targetted staging: https://github.com/NixOS/nixpkgs/pull/480716 14:47:09
@k900:0upti.meK900glibc security update22:15:05
@k900:0upti.meK900Practical applicability unlikely but kinda sus22:15:15
@k900:0upti.meK900Do we scrap22:15:18
@tnias:stratum0.orgtnias joined the room.22:24:40
@vcunat:matrix.orgVladimír ČunátThat would delay the cycle roughly by 4 days currently, I'd estimate.22:29:41
@fabianhjr:matrix.orgFabián Heredia
In reply to @k900:0upti.me
Practical applicability unlikely but kinda sus
Got the CVE/Advisory?
22:31:13
@fabianhjr:matrix.orgFabián Heredia* Got the CVE/Advisory/Bulletin?22:31:35
@emilazy:matrix.orgemilyfor an integer overflow issue in a memory allocation function? no22:31:59
@emilazy:matrix.orgemilyanything letting untrusted parties pass huge values there is doomed already22:32:15
@emilazy:matrix.orgemilyhttps://matrix.to/#/!ZRgXNaHrdpGqwUnGnj:nixos.org/$_nFYUuPwe8sGpb2iv1WyH1FKc7L_JM6CRRCF9fhPlKg?via=nixos.org&via=matrix.org&via=nixos.dev22:32:30
@emilazy:matrix.orgemilyalso, this involves allocating an object whose size can't fit in ptrdiff_t?22:33:28
@emilazy:matrix.orgemilythat's UB in both LLVM and GCC22:33:34

Show newer messages


Back to Room ListRoom Version: 6