!ZRgXNaHrdpGqwUnGnj:nixos.org

NixOS Security Triage

702 Members
Coordination and triage of security issues in nixpkgs214 Servers

Load older messages


SenderMessageTime
25 Aug 2021
@hexa:lossy.networkhexalooking for feedback about the impact of the CVEs and the appropriate target branch00:23:25
@pepe:matrix.giugl.ioErPepone changed their display name from pepe to ErPepone.10:06:32
@sandro:supersandro.deSandroif we had some scores for the CVE it would be easier to assess how sever it is10:09:21
@andi:kack.itandi-The first one allows input to define 62 bytes of stack space. That could be disasterous. The other allows to exfiltrate key material at worst. I'd just dump both of them onto an otherwise empty staging-next jobset or just master if we don't have a staging job that is otherwise not occupied. The last thing you want is some other upgrade slowing this down.10:14:17
@hexa:lossy.networkhexarebased on top of master12:24:03
@r_i_s:matrix.orgris_yeah basically "it's bad". it hinges on how many applications are actually set up to accept SM2 in their cipher suites, because it's pretty obscure. but we probably don't want to rely on that too much. the "medium" one is almost as bad i'd say seeing as this is a situation where private memory contents are likely to be sensitive, containing cryptographic materials18:00:46
@hexa:lossy.networkhexafeel free to merge18:15:44
@hexa:lossy.networkhexa * feel free to merge. Dear darwin.... 20:39:55
@hexa:lossy.networkhexa * feel free to merge. Dear darwin.... 20:40:03
@6aa4fd:tchncs.de6aa4fd joined the room.23:11:00
26 Aug 2021
@sandro:supersandro.deSandroCVE-2021-3634 https://ubuntu.com/security/notices/USN-5053-117:17:12
@sandro:supersandro.deSandro * CVE-2021-3634 https://ubuntu.com/security/CVE-2021-363417:17:32
@sandro:supersandro.deSandro

good, finally found some real information on Debian tracker https://security-tracker.debian.org/tracker/CVE-2021-3634

  • https://www.libssh.org/2021/08/26/libssh-0-9-6-security-release/
  • https://www.libssh.org/security/advisories/CVE-2021-3634.txt
    and the patch https://git.libssh.org/projects/libssh.git/commit/?id=d3060bc84ed4e160082e819b4d404f76df7c8063
17:18:37
@hexa:lossy.networkhexaworking on it17:28:19
@sandro:supersandro.deSandroThanks! It has a 5.3 score. Not sure if we go through master or staging. Maybe staging next?17:28:59
@hexa:lossy.networkhexa== Versions: 0.9.1 - 0.9.517:29:24
@hexa:lossy.networkhexawe were on 0.8.9, are we even affected?17:29:32
@sandro:supersandro.deSandroSounds like no but then we should think about updating17:30:03
@sandro:supersandro.deSandro* Sounds like no but then we should think about updating nevertheless17:30:15
@hexa:lossy.networkhexayup, via staging17:30:19
@hexa:lossy.networkhexayup, unaffected17:30:53
@sandro:supersandro.deSandroI would do that in a bit if you don't mind17:36:14
@hexa:lossy.networkhexahttps://github.com/NixOS/nixpkgs/pull/13582117:39:06
@hexa:lossy.networkhexasorry, that was a few minutes too late17:39:22
@sandro:supersandro.deSandrono problem, easy bump anyway19:08:17
27 Aug 2021
@hexa:lossy.networkhexa ris_: can you give openssl another shot? 23:15:58
@r_i_s:matrix.orgris_ah ok23:16:11
@hexa:lossy.networkhexahttps://github.com/NixOS/nixpkgs/pull/13561123:16:19
@r_i_s:matrix.orgris_the "early" version of it has built fine, but the "real" version needs the full "curl bootstrap" to build, which includes llvm on macos23:44:43
@r_i_s:matrix.orgris_though it was the early version that failed last time23:44:59

There are no newer messages yet.


Back to Room ListRoom Version: 6