!ZRgXNaHrdpGqwUnGnj:nixos.org

NixOS Security Triage

700 Members
Coordination and triage of security issues in nixpkgs216 Servers

Load older messages


SenderMessageTime
20 Mar 2026
@niklaskorz:matrix.orgniklaskorzhttps://github.com/NixOS/nixpkgs/pull/50160611:57:19
@emilazy:matrix.orgemilyuh, going by that blog post maybe we should just be slapping knownVulnerabilities on this thing or removing it...12:03:08
@emilazy:matrix.orgemily I guess if there's no known compromise in the previous version... 12:04:25
@blitz:chat.x86.lolblitzat least the knownVulnerabilites would be good to warn people that this thing is f***ed16:04:34
@blitz:chat.x86.lolblitz * 16:04:39
@eouzoe:matrix.org曜日@delroth:delroth.net — Greetings, do forgive the intrusion. There is a line from your security wishlist that has stayed with me — that Hydra attestation was dependent on other projects to actually be useful. One of those projects may now exist. The first is already built. https://github.com/eouzoe/Apeiron Apeiron is a deterministic execution fabric — builds run inside Firecracker microVMs, defined by Nix-hermetic closures. The build environment is sealed. Every output is a cryptographic consequence of its inputs, and nothing else. The question of whether the environment itself was clean is a different problem. That is what comes next. An observer at the kernel layer — eBPF LSM inside the boundary, watching at syscall level as execution happens. Signing takes place outside the hypervisor. A compromised guest cannot revise what the kernel recorded. The design is complete. What remains is building it. If any of this is of interest, I would welcome a conversation. 17:36:44
@eouzoe:matrix.org曜日 set a profile picture.17:37:26
@vcunat:matrix.orgvcunatexpat: https://github.com/NixOS/nixpkgs/pull/50168517:41:39
@raitobezarius:matrix.orgraitobezariusyou should DM delroth directly, he's not involved in the NixOS project anymore17:43:02
@raitobezarius:matrix.orgraitobezarius(also discussions not here)17:43:10
@eouzoe:matrix.org曜日My apologies for the confusion. I had only meant to share the project here — though I came across a wishlist that seemed to align rather closely with what it does, and one thing led to another.17:54:20
@eouzoe:matrix.org曜日Apologies — should I take this to #security:nixos.org instead?17:55:05
@eouzoe:matrix.org曜日* Apologies — should I take this to #security-discuss:nixos.org instead?17:55:17
@elvishjerricco:matrix.orgElvishJerriccohttps://github.com/NixOS/nixpkgs/pull/501701 fixing a vuln in https://github.com/NixOS/nixpkgs/pull/493445 that is presently on master18:38:59
@elvishjerricco:matrix.orgElvishJerricconeed to make sure it doesn't hit unstable. It's already on unstable-small18:40:19
@robert:funklause.dedotlambdanot sure what to do about https://github.com/NixOS/nixpkgs/issues/500142 on 25.1118:43:45
@robert:funklause.dedotlambdahttps://github.com/jpadilla/pyjwt/commit/051ea341b5573fe3edcd53042f347929b92c2b92 doesn't apply cleanly18:44:18
@elvishjerricco:matrix.orgElvishJerricco K900, vcunat: do we need to cancel an unstable eval or anything like that to keep this from hitting unstable? I suspect it impacts a significant portion of boot.initrd.secrets users. 19:10:05
@vcunat:matrix.orgvcunat Since the tested job passed, cancelling the rest would make it advance immediately. 19:11:42
@vcunat:matrix.orgvcunat And it's in unstable-small channel, too. 19:12:14
@elvishjerricco:matrix.orgElvishJerriccoSo we'll have to just merge and wait for it to reach unstable in a few days? Do we need to issue an advisory then?19:14:01
@vcunat:matrix.orgvcunat unstable-small can get it within a couple hours. 19:14:54
@lennart:0520.chlennart not meaning to be rude, but I have highlight on for every message in this channel. I guess lots of others of us 670+ people do so aswell, can you switch over to #security-discuss:nixos.org? 19:15:33
@emilazy:matrix.orgemily(I don't think a highlight on every message in here is a good idea, it's not an advisory notification channel, triage has to happen in the triage room even if not extended discussions…)19:16:56
@emilazy:matrix.orgemily(& many many vulnerabilities never come up in here at all 😅)19:17:31
@lennart:0520.chlennartah sorry, that wasn't clear to me.19:17:36
@lennart:0520.chlennartI vaguely remember that I had this before, sorry, gonna turn of the notifications :D19:48:31
21 Mar 2026
@vcunat:matrix.orgvcunat Noone has reacted the initrd secrets problem apparently? I think it wouldn't be too hard to prevent nixos-unstable from updating, but should we? Also if it's bad, we need to merge quickly to fix nixos-unstable-small. 06:16:30
@k900:0upti.meK900 We should 06:16:46
@k900:0upti.meK900It's stupid06:16:51

Show newer messages


Back to Room ListRoom Version: 6