!UNVBThoJtlIiVwiDjU:nixos.org

Staging

360 Members
Staging merges | Find currently open staging-next PRs: https://github.com/NixOS/nixpkgs/pulls?q=is%3Apr+sort%3Aupdated-desc+head%3Astaging-next+head%3Astaging-next-21.05+is%3Aopen116 Servers

You have reached the beginning of time (for this room).


SenderMessageTime
16 Jan 2026
@fabianhjr:matrix.orgFabián Heredia* Got the CVE/Advisory/Bulletin?22:31:35
@emilazy:matrix.orgemilyfor an integer overflow issue in a memory allocation function? no22:31:59
@emilazy:matrix.orgemilyanything letting untrusted parties pass huge values there is doomed already22:32:15
@emilazy:matrix.orgemilyhttps://matrix.to/#/!ZRgXNaHrdpGqwUnGnj:nixos.org/$_nFYUuPwe8sGpb2iv1WyH1FKc7L_JM6CRRCF9fhPlKg?via=nixos.org&via=matrix.org&via=nixos.dev22:32:30
@emilazy:matrix.orgemilyalso, this involves allocating an object whose size can't fit in ptrdiff_t?22:33:28
@emilazy:matrix.orgemilythat's UB in both LLVM and GCC22:33:34
@emilazy:matrix.orgemilyso a security bug in any code that allows user input to trigger it both before and after remediation22:33:56
@emilazy:matrix.orgemilyor well, maybe the alignment part makes it subtler here22:34:40
@emilazy:matrix.orgemilygiving untrusted input control over alignment is pretty wild already though. unless I'm missing something this feels like nothing22:35:14
@fabianhjr:matrix.orgFabián HerediaThere are two, that is the first one and the second one is stack leak to a dns resolver22:37:35
@emilazy:matrix.orgemilyah ok I missed that one22:37:49

Show newer messages


Back to Room ListRoom Version: 6