!ZRgXNaHrdpGqwUnGnj:nixos.org

NixOS Security Triage

711 Members
Coordination and triage of security issues in nixpkgs217 Servers

Load older messages


SenderMessageTime
27 Jan 2024
@metanoic:matrix.org@metanoic:matrix.org joined the room.13:31:42
@dooy:matrix.org@dooy:matrix.org changed their display name from Dooygoy to stablejoy.13:37:43
28 Jan 2024
@ncfavier:matrix.orgnf changed their profile picture.14:04:04
@kudzu:envs.net@kudzu:envs.net joined the room.20:37:07
29 Jan 2024
@sandro:supersandro.deSandrohttps://github.com/NixOS/nixpkgs/pull/284771 I think https://github.com/paperless-ngx/paperless-ngx/issues/5502 applies only applies to custom configuration but it is an authentication bypass for a very sensitive system.13:42:19
@sandro:supersandro.deSandro

We are planning to release critical security patches for versions 3.5, 4.1, 4.2 and nightly this Thursday, Feb 01, at 15:00 UTC. We encourage server administrators to plan for a timely upgrade to ensure their Mastodon server is protected.

https://c3d2.social/@MastodonEngineering@mastodon.social/111839555900486563

13:52:17
@xfix:matrix.org@xfix:matrix.org left the room.14:52:41
@flandweber:envs.net@flandweber:envs.net joined the room.15:01:57
@jarrrkob:matrix.orgjarrrkob joined the room.15:18:04
@flandweber:envs.net@flandweber:envs.net changed their display name from flandweber to Finn Landweber.18:20:08
30 Jan 2024
@hugosenario:matrix.orgHugo Ribeiro joined the room.02:22:47
@hexa:lossy.networkhexa Markus Theil: openssl updates are live 14:24:45
@mtheil:scs.ems.host@mtheil:scs.ems.hostthx, PR follows soon.14:26:12
@mtheil:scs.ems.host@mtheil:scs.ems.hosthttps://github.com/NixOS/nixpkgs/pull/28501915:31:51
@mtheil:scs.ems.host@mtheil:scs.ems.hostAs the severity of the fixed issues is low, I'm waiting for a list of fixed things to appear on openssl.org15:32:33
@mtheil:scs.ems.host@mtheil:scs.ems.host * As the severity of the fixed issues is low, I'm waiting for a list of fixed things to appear on openssl.org to include it in the descriptions.15:32:45
@hexa:lossy.networkhexahttps://github.com/openssl/openssl/blob/openssl-3.2.1/CHANGES.md#changes-between-320-and-321-30-jan-2024 https://github.com/openssl/openssl/blob/openssl-3.0.13/CHANGES.md#changes-between-3012-and-3013-30-jan-202415:34:07
@hexa:lossy.networkhexause these.15:34:13
@mtheil:scs.ems.host@mtheil:scs.ems.hostthx15:36:10
@vcunat:matrix.orgvcunatOne of these might be a low-rebuild change, but I suppose there's no hurry to get the changes anyway?15:43:08
@ajs124:ajs124.deajs1243.2 should be low rebuild15:45:19
@mtheil:scs.ems.host@mtheil:scs.ems.hostFor 23.11: https://github.com/NixOS/nixpkgs/pull/28502716:07:53
@delroth:delroth.netdelrothhttps://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt18:35:50
@delroth:delroth.netdelrothswitching the wrappers to musl was a very good idea18:36:06
@aloisw:kde.org@aloisw:kde.org
In reply to @delroth:delroth.net
switching the wrappers to musl was a very good idea
The wrappers do not call syslog.
18:53:01
@delroth:delroth.netdelroththis was a general statement on glibc, not on this particular vuln :)18:54:37
@tgerbet:matrix.orgtgerbet
In reply to @delroth:delroth.net
https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt
https://github.com/NixOS/nixpkgs/pull/285050
18:57:59
@delroth:delroth.netdelrothwe can move followup discussion to the discuss channel, I think we do need to remediate that last glibc vuln because wrappers forward all of argv (including argv[0]) to the wrapped program18:58:10
31 Jan 2024
@federicodschonborn:matrix.org@federicodschonborn:matrix.org changed their profile picture.03:36:03
@federicodschonborn:matrix.org@federicodschonborn:matrix.org changed their profile picture.06:21:40

Show newer messages


Back to Room ListRoom Version: 6