!ZRgXNaHrdpGqwUnGnj:nixos.org

NixOS Security Triage

715 Members
Coordination and triage of security issues in nixpkgs219 Servers

Load older messages


SenderMessageTime
27 Oct 2023
@hexa:lossy.networkhexaopen-vm-tools https://www.openwall.com/lists/oss-security/2023/10/27/1 https://www.openwall.com/lists/oss-security/2023/10/27/210:52:49
@raboof:matrix.orgraboofhttps://www.cve.org/CVERecord?id=CVE-2023-4660415:11:17
@hexa:lossy.networkhexa
In reply to @raboof:matrix.org
https://www.cve.org/CVERecord?id=CVE-2023-46604
https://github.com/NixOS/nixpkgs/pull/263804
15:12:35
29 Oct 2023
@zzywysm:matrix.orgzzywysm joined the room.00:08:43
@r_i_s:matrix.orgris_ libsass has 3 unfixed vulnerabilities https://nvd.nist.gov/vuln/detail/CVE-2022-26592 https://nvd.nist.gov/vuln/detail/CVE-2022-43357 https://nvd.nist.gov/vuln/detail/CVE-2022-43358. they're all stack overflows, so likely not more than a DoS. but upstream states that libsass is deprecated & unmaintained, so that makes me feel we should knownVulnerabilities them - but it would break a number of packages 14:25:11
@hexa:lossy.networkhexa"break"14:26:59
@hexa:lossy.networkhexa I get your point, but I think setting meta.knownVulnerabilities is the correct move and then users can decide to allow it 14:28:05
@r_i_s:matrix.orgris_ yeah i guess my only hesitation is how knownVulnerabilities puts dependent packages off our radar for spotting further breakages (via hydra and nixpkgs-review), which can be a death sentence 14:35:14
@hexa:lossy.networkhexaif noone cares for them (upstream and/or downstream) that is a reasonable outcome14:36:14
@hexa:lossy.networkhexaI think best case we can ping every maintainer of affected packages, and make sure they take this upstream14:36:43
@r_i_s:matrix.orgris_or remove the dependency if it's trivial/optional14:38:52
@r_i_s:matrix.orgris_of course, npm packages will be bundling it for years to come14:39:15
@r_i_s:matrix.orgris_gtk3 and gtk4 depend on saasc :)15:26:36
@r_i_s:matrix.orgris_ it's not clear if libsass has any existing mechanism to limit stack depth 15:29:49
@r_i_s:matrix.orgris_aha https://github.com/sass/libsass/blob/2102188d21d2b7577c2b3edb12832e90786a2831/src/eval.cpp#L96115:31:11
@r_i_s:matrix.orgris_ looks like the problem is it's building a circular reference during the parse phase and then recursing into that via the has_real_parent_ref methods 18:12:49
@r_i_s:matrix.orgris_ i think the reference cycle gets completed at https://github.com/sass/libsass/blob/2102188d21d2b7577c2b3edb12832e90786a2831/src/ast_selectors.cpp#L1032 18:35:06
@r_i_s:matrix.orgris_ in other news i think we're going to have to mark freeimage as vulnerable to a bunch of things too 19:18:22
@ss:someonex.netSomeoneSerge (matrix works sometimes) changed their display name from SomeoneSerge (UTC+1) to SomeoneSerge (UTC+2).22:41:25
30 Oct 2023
@zzywysm:matrix.orgzzywysm set a profile picture.14:27:04
@toonn:matrix.orgtoonn changed their profile picture.19:51:20
31 Oct 2023
@r_i_s:matrix.orgris_ what do people think about https://github.com/NixOS/nixpkgs/pull/264226 and marking it with knownVulnerabilities (and by extension hylafax+) 21:55:16
1 Nov 2023
@cafkafk:gitter.imcafkafk left the room.10:41:33
@hexa:lossy.networkhexahttps://www.djangoproject.com/weblog/2023/nov/01/security-releases/ will take care of that in a bit12:39:51
@arcayr:rascals.net@arcayr:rascals.net joined the room.17:52:38
@hexa:lossy.networkhexaoh well23:41:45
@hexa:lossy.networkhexa

CVE-2023-46695: Potential denial of service vulnerability in UsernameField on Windows

23:41:47
@raitobezarius:matrix.orgraitobezariusyou don't know if someone is cross compiling to Windows23:42:24
@raitobezarius:matrix.orgraitobezarius(sorry I wanted to mention it before but I thought you were accounting for that case)23:42:36
@hexa:lossy.networkhexaI'm bumping it, but its much less urgent due to that23:42:57

Show newer messages


Back to Room ListRoom Version: 6