!UNVBThoJtlIiVwiDjU:nixos.org

Staging

341 Members
Staging merges | Running staging cycles: https://github.com/NixOS/nixpkgs/pulls?q=is%3Apr+is%3Aopen+head%3Astaging-next+head%3Astaging-next-25.11 | Review Reports: https://malob.github.io/nix-review-tools-reports/113 Servers

Load older messages


SenderMessageTime
16 Jan 2026
@glepage:matrix.orgGaétan Lepage

In terms of rebuilds? A few thousands probably.

In terms of severity, it's not security-related. It fixes a specific issue that we discovered on cudaSupport when updating onnxruntime (https://github.com/NixOS/nixpkgs/pull/450587#discussion_r2698215974).

I can target staging if needed.

14:17:42
@k900:0upti.meK900No, rebuild wise it is a lot more than that14:18:59
@k900:0upti.meK900I want to know what the impact is14:19:06
@glepage:matrix.orgGaétan Lepage For now I targetted staging: https://github.com/NixOS/nixpkgs/pull/480716 14:47:09
@k900:0upti.meK900glibc security update22:15:05
@k900:0upti.meK900Practical applicability unlikely but kinda sus22:15:15
@k900:0upti.meK900Do we scrap22:15:18
@tnias:stratum0.orgtnias joined the room.22:24:40
@vcunat:matrix.orgVladimír ČunátThat would delay the cycle roughly by 4 days currently, I'd estimate.22:29:41
@fabianhjr:matrix.orgFabián Heredia
In reply to @k900:0upti.me
Practical applicability unlikely but kinda sus
Got the CVE/Advisory?
22:31:13
@fabianhjr:matrix.orgFabián Heredia* Got the CVE/Advisory/Bulletin?22:31:35
@emilazy:matrix.orgemilyfor an integer overflow issue in a memory allocation function? no22:31:59
@emilazy:matrix.orgemilyanything letting untrusted parties pass huge values there is doomed already22:32:15
@emilazy:matrix.orgemilyhttps://matrix.to/#/!ZRgXNaHrdpGqwUnGnj:nixos.org/$_nFYUuPwe8sGpb2iv1WyH1FKc7L_JM6CRRCF9fhPlKg?via=nixos.org&via=matrix.org&via=nixos.dev22:32:30
@emilazy:matrix.orgemilyalso, this involves allocating an object whose size can't fit in ptrdiff_t?22:33:28
@emilazy:matrix.orgemilythat's UB in both LLVM and GCC22:33:34
@emilazy:matrix.orgemilyso a security bug in any code that allows user input to trigger it both before and after remediation22:33:56
@emilazy:matrix.orgemilyor well, maybe the alignment part makes it subtler here22:34:40
@emilazy:matrix.orgemilygiving untrusted input control over alignment is pretty wild already though. unless I'm missing something this feels like nothing22:35:14
@fabianhjr:matrix.orgFabián HerediaThere are two, that is the first one and the second one is stack leak to a dns resolver22:37:35
@emilazy:matrix.orgemilyah ok I missed that one22:37:49
@emilazy:matrix.orgemilythat one is also nothing :)22:38:28
@fabianhjr:matrix.orgFabián HerediaThough I would say I don't think those are critical enough to require and inmediate rebuild22:38:31
@ma27:nicht-so.sexyma27fwiw no objections from my side on targeting staging instead of -next. Can retarget the PR tomorrow, I'll go to sleep now.22:39:24
@k900:0upti.meK900 The second one is nothing 22:39:41
@k900:0upti.meK900The first one I may have misread22:39:47
@k900:0upti.meK900It's almost 2AM22:39:51
@emilazy:matrix.orgemilyyeah heap overflow in a case that is maybe compiler UB regardless and I'm any case involves giving attackers crazy levels of control of memory allocation, plus uncommon calls leaking small amounts of stack to DNS server = I sleep22:40:41
@emilazy:matrix.orgemilyI'd expect -next contains juicier fixes already22:41:40
17 Jan 2026
@xokdvium:matrix.orgSergei Zimmerman (xokdvium)There's a slight include messup with cppnix 2.33 and glibc 2.42. I should send that to staging-next now? https://github.com/NixOS/nix/pull/1501118:45:42

Show newer messages


Back to Room ListRoom Version: 6