!ZRgXNaHrdpGqwUnGnj:nixos.org

NixOS Security Triage

720 Members
Coordination and triage of security issues in nixpkgs219 Servers

Load older messages


SenderMessageTime
25 Oct 2023
@k900:0upti.meK900https://github.com/NixOS/nixpkgs/pull/263317 kernel update with a potentially pretty spooky KVM vuln11:07:42
@k900:0upti.meK900https://www.phoronix.com/news/X.Org-Halloween-Bugs-2023 and a bunch of X11 vulns because duh11:19:48
@k900:0upti.meK900 @Artturin what's the status on the X11 untangling PR? 11:20:09
@artturin:matrix.orgArtturin
In reply to @k900:0upti.me
https://www.phoronix.com/news/X.Org-Halloween-Bugs-2023 and a bunch of X11 vulns because duh
Haven't started manual moving so just update like normal
17:26:58
26 Oct 2023
@lotte:chir.rs@lotte:chir.rs changed their profile picture.06:50:34
@felschr:matrix.orgfelschrhttps://github.com/NixOS/nixpkgs/pull/263399 https://github.com/NixOS/nixpkgs/pull/26340112:17:26
@streets_saucing:matrix.orgstreets joined the room.12:33:50
@felschr:matrix.orgfelschrPRs now have one approval each21:44:21
27 Oct 2023
@federicodschonborn:matrix.org@federicodschonborn:matrix.org changed their profile picture.01:24:45
@vcunat:matrix.orgvcunat
In reply to @k900:0upti.me
https://www.phoronix.com/news/X.Org-Halloween-Bugs-2023 and a bunch of X11 vulns because duh
I wonder how bad they are - rebuilds vs. speed of update:
https://github.com/NixOS/nixpkgs/pull/263689#issuecomment-1782340466
06:15:31
@k900:0upti.meK900Huh06:16:41
@k900:0upti.meK900Why does xserver have 2k reverse-dependencies06:16:50
@k900:0upti.meK900/me checks06:18:15
@k900:0upti.meK900OK great it's not xserver06:23:06
@k900:0upti.meK900It's luit -> xterm -> 800+ individual packages06:23:13
@k900:0upti.meK900(wat)06:23:14
@k900:0upti.meK900As far as I can tell the luit update is not security06:24:44
@hexa:lossy.networkhexaopen-vm-tools https://www.openwall.com/lists/oss-security/2023/10/27/1 https://www.openwall.com/lists/oss-security/2023/10/27/210:52:49
@raboof:matrix.orgraboofhttps://www.cve.org/CVERecord?id=CVE-2023-4660415:11:17
@hexa:lossy.networkhexa
In reply to @raboof:matrix.org
https://www.cve.org/CVERecord?id=CVE-2023-46604
https://github.com/NixOS/nixpkgs/pull/263804
15:12:35
29 Oct 2023
@zzywysm:matrix.orgzzywysm joined the room.00:08:43
@r_i_s:matrix.orgris_ libsass has 3 unfixed vulnerabilities https://nvd.nist.gov/vuln/detail/CVE-2022-26592 https://nvd.nist.gov/vuln/detail/CVE-2022-43357 https://nvd.nist.gov/vuln/detail/CVE-2022-43358. they're all stack overflows, so likely not more than a DoS. but upstream states that libsass is deprecated & unmaintained, so that makes me feel we should knownVulnerabilities them - but it would break a number of packages 14:25:11
@hexa:lossy.networkhexa"break"14:26:59
@hexa:lossy.networkhexa I get your point, but I think setting meta.knownVulnerabilities is the correct move and then users can decide to allow it 14:28:05
@r_i_s:matrix.orgris_ yeah i guess my only hesitation is how knownVulnerabilities puts dependent packages off our radar for spotting further breakages (via hydra and nixpkgs-review), which can be a death sentence 14:35:14
@hexa:lossy.networkhexaif noone cares for them (upstream and/or downstream) that is a reasonable outcome14:36:14
@hexa:lossy.networkhexaI think best case we can ping every maintainer of affected packages, and make sure they take this upstream14:36:43
@r_i_s:matrix.orgris_or remove the dependency if it's trivial/optional14:38:52
@r_i_s:matrix.orgris_of course, npm packages will be bundling it for years to come14:39:15
@r_i_s:matrix.orgris_gtk3 and gtk4 depend on saasc :)15:26:36

Show newer messages


Back to Room ListRoom Version: 6