!ZRgXNaHrdpGqwUnGnj:nixos.org

NixOS Security Triage

687 Members
Coordination and triage of security issues in nixpkgs215 Servers

Load older messages


SenderMessageTime
11 Jun 2021
@henson:matrix.orgHenson Sandro: and the name wouldn't have to be really long like that, either. Something like a simple integer increment like 0.118-p3 would be sufficient for someone to tell if it was pre or post fix 11:50:11
@henson:matrix.orgHensonbut that would mess things up if you were trying to merge multiple patches together, or put the patch into different locations in the source tree that have different patch numbers. Then you'd get ambiguous patch level numbers where p3 in one branch would be different than p3 in another branch11:51:59
@pennae:matrix.eno.spacepennaeinclude the hash of each patch in metadata somewhere? 🤔11:54:26
@synthetica:matrix.orgSyntheticameta.securitypatches11:54:54
@synthetica:matrix.orgSyntheticaI kinda like it 🤔11:55:01
@sandro:supersandro.deSandrowe don't need new metadata11:56:30
@synthetica:matrix.orgSyntheticaI suppose you could also parse .patches somehow11:57:01
@sandro:supersandro.deSandro
In reply to @henson:matrix.org
but that would mess things up if you were trying to merge multiple patches together, or put the patch into different locations in the source tree that have different patch numbers. Then you'd get ambiguous patch level numbers where p3 in one branch would be different than p3 in another branch
that sounds like a you problem then
11:57:05
@sandro:supersandro.deSandro
In reply to @synthetica:matrix.org
I suppose you could also parse .patches somehow
yeah
11:57:09
@philipp:xndr.dephilipp
In reply to @sandro:supersandro.de
that sounds like a you problem then
Rude!
11:58:02
@sandro:supersandro.deSandronix-channels are identified by git hashes. If you are merging them around then they are broken. Rebase your forks to prevent that.12:02:21
@sandro:supersandro.deSandroI don't believe that adding more metadata that needs to be maintained solves the problem in a maintainable way 12:04:18
@sandro:supersandro.deSandro
In reply to @sandro:supersandro.de
nix-channels are identified by git hashes. If you are merging them around then they are broken. Rebase your forks to prevent that.
*advancement of the channels
12:10:45
@sandro:supersandro.deSandrowe don't have version numbers for packages and you can't say you need at least hash X, so we need to use git hashes to know if something is already patched12:11:17
@sandro:supersandro.deSandroif you break them via a 3 way merge you would need to look at the actual file if you have the patch12:11:34
@sandro:supersandro.deSandroWe could also track all the CVEs fixed in any package version but who is going to maintain that data? It is only useful if you know that the data is right.12:15:25
@henson:matrix.orgHenson Sandro: I'm starting to see the benefit of your original suggestion. Tracing the package to a channel and then if that's pre or post fix allows you to answer the question of "is my package vulnerable" without version numbering or meta data, and in a way that doesn't cause any merging problems regardless of where the fix enters the source tree. 12:17:45
@henson:matrix.orgHenson Sandro: but what if a particular package is stale relative to your channel. If you update your nix channel but don't upgrade any of your packages, or if a new package uses an old package as a dependency, then your user's channel hash will not tell you whether a particular package came from that channel. 12:18:58
@sandro:supersandro.deSandroyou ofcourse need to rebuild your configuration for it to take affect 12:21:01
@sandro:supersandro.deSandrodon't know about nix-env. Update everything?12:21:11
@henson:matrix.orgHenson Sandro: of course I know about nix-env to upgrade everything 12:21:43
@sandro:supersandro.deSandroif you are not mixing channels or importing any other nixpkgs then you shouldn't be able to use an old version12:21:46
@henson:matrix.orgHenson Sandro: are my questions annoying you? 12:25:55
@sandro:supersandro.deSandronope12:27:15
@sandro:supersandro.deSandro * not at all12:27:20
@sandro:supersandro.deSandroI don't think we have anything to know if any stale package are used. You probably just want to upgrade everything and then garbage collect12:27:48
@sandro:supersandro.deSandroif the store path is still there then figure out what uses it12:28:00
@henson:matrix.orgHenson Sandro: ok 12:30:59
@henson:matrix.orgHensonbut say you've got a bunch of NixOS computers in production and you want to determine if they're vulnerable and only upgrade them if necessary, or perhaps only upgrade the vulnerable packages. I had a server that was used by people that was vulnerable to the sudo bug, but for certain reasons I couldn't upgrade the entire computer, so I did an overlay with just the sudo fix in it. I feel like there should be a way to do a security audit on a system to determine if it's vulnerable other than upgrading every package. I don't feel like this is an academic question, is it? Isn't determining if a system is vulnerable and only upgrading it if necessary (or perhaps only the vulnerable packages if possible) something that people do in practice?14:18:48
@andi:kack.itandi-Regarding the fix: use the git version that your channel is on. Same story as with random version suffixes: you still have to make a lookup to see in which one it is.14:22:18

There are no newer messages yet.


Back to Room ListRoom Version: 6