!ZRgXNaHrdpGqwUnGnj:nixos.org

NixOS Security Triage

656 Members
Coordination and triage of security issues in nixpkgs | Discussions in #security-discuss:nixos.org | Open PRs: https://github.com/NixOS/nixpkgs/pulls?q=is%3Apr+is%3Aopen+sort%3Aupdated-desc+label%3A%221.severity%3A+security%22204 Servers

Load older messages


SenderMessageTime
26 Nov 2025
@k900:0upti.meK900Something something petard19:43:02
@vcunat:matrix.orgvcunat

Why is it called RCE? They write

attackers with limited sudo privileges

19:43:47
@vcunat:matrix.orgvcunatThat's like a completely different level of severity.19:44:12
@hexa:lossy.networkhexaposted it before reading it fully, doesn't make sense to me yet, sorry19:44:51
@mdaniels5757:matrix.orgmdaniels5757The "vuln"s listed are different. On https://packetstorm.news/files/id/189989, the "vuln" is that when you set an arbitrary shell command to run when an IP is banned, and then an IP is banned, the arbitrary shells script runs. But on https://gist.github.com/R-Security/1c707a08f9c7f9a91d9d84b5010aaed2, it claims that there is "insufficient sanitization of variables", I see no evidence of that provided. CVE slop?20:42:47
@mdaniels5757:matrix.orgmdaniels5757I'll file an issue with upstream and see what they say.20:43:35
@mdaniels5757:matrix.orgmdaniels5757https://github.com/fail2ban/fail2ban/issues/411020:58:18
@hexa:lossy.networkhexahttps://nlnetlabs.nl/news/2025/Nov/26/unbound-1.24.2-released/21:32:26
@hexa:lossy.networkhexasomething more actionable21:32:33
@scrumplex:duckhub.ioScrumplex
In reply to @hexa:lossy.network
something more actionable
Has already been merged into staging. Currently building 25.05 and 25.11 backports
22:12:34
@scrumplex:duckhub.ioScrumplex *

Has already been merged into staging. Currently building 25.05 and 25.11 backports

Edit: https://github.com/NixOS/nixpkgs/pull/465262

22:13:53
27 Nov 2025
@robert:funklause.dedotlambdahttps://github.com/NixOS/nixpkgs/pull/445729#issuecomment-358362084600:20:14
@robert:funklause.dedotlambdahttps://github.com/NixOS/nixpkgs/pull/46543300:21:08
@conatsera:matrix.orgconatsera joined the room.03:14:14
@hexa:lossy.networkhexahttps://github.com/OpenPrinting/cups/releases/tag/v2.4.1515:33:22
@hexa:lossy.networkhexawell, denial of service15:33:58
@hexa:lossy.networkhexaif you expose a cupsd that wide 🤷15:34:06
28 Nov 2025
@grimmauld:m.grimmauld.deGrimmauld (any/all) changed their display name from grimmauld (any/all) to musl-official | Grimm | any/all.11:35:37
@grimmauld:m.grimmauld.deGrimmauld (any/all) changed their display name from musl-official | Grimm | any/all to Grimmauld (any/all).11:36:00
29 Nov 2025
@amadaluzia:unredacted.orgamadaluzia changed their profile picture.11:40:57
30 Nov 2025
@sdier:matrix.org@sdier:matrix.org left the room.15:36:54
1 Dec 2025
@niklaskorz:matrix.orgniklaskorz https://kde.org/info/security/advisory-20251128-1.txt 12:10:35
@niklaskorz:matrix.orgniklaskorz(fix already landed in both 25.11 and unstable but 25.05 appears to be still affected)12:12:17
@k900:0upti.meK900I think 25.05 might be too old, someone needs to backport the patch12:13:32
@niklaskorz:matrix.orgniklaskorzOr mark as vulnerable and hint that 25.11 has the fix until someone as time to backport the patch12:17:01
@niklaskorz:matrix.orgniklaskorz* Or mark as vulnerable and hint that 25.11 has the fix until someone has time to backport the patch12:17:11
@niklaskorz:matrix.orgniklaskorz Actually never mind that, the fix has been merged into 25.05 too by @K900 hree days ago, just hasnt reached nixos-25.05 yet 13:01:07
@k900:0upti.meK900OK I'm thinking of something else then13:01:25
@k900:0upti.meK900(narrator voice: he was not, in fact, thinking)13:01:37
@niklaskorz:matrix.orgniklaskorz * Actually never mind that, the fix has been merged into 25.05 too by @K900 three days ago, just hasnt reached nixos-25.05 yet 13:01:52

There are no newer messages yet.


Back to Room ListRoom Version: 6