!ZRgXNaHrdpGqwUnGnj:nixos.org

NixOS Security Triage

695 Members
Coordination and triage of security issues in nixpkgs217 Servers

Load older messages


SenderMessageTime
11 Jun 2021
@sandro:supersandro.deSandronope12:27:15
@sandro:supersandro.deSandro * not at all12:27:20
@sandro:supersandro.deSandroI don't think we have anything to know if any stale package are used. You probably just want to upgrade everything and then garbage collect12:27:48
@sandro:supersandro.deSandroif the store path is still there then figure out what uses it12:28:00
@henson:matrix.orgHenson Sandro: ok 12:30:59
@henson:matrix.orgHensonbut say you've got a bunch of NixOS computers in production and you want to determine if they're vulnerable and only upgrade them if necessary, or perhaps only upgrade the vulnerable packages. I had a server that was used by people that was vulnerable to the sudo bug, but for certain reasons I couldn't upgrade the entire computer, so I did an overlay with just the sudo fix in it. I feel like there should be a way to do a security audit on a system to determine if it's vulnerable other than upgrading every package. I don't feel like this is an academic question, is it? Isn't determining if a system is vulnerable and only upgrading it if necessary (or perhaps only the vulnerable packages if possible) something that people do in practice?14:18:48
@andi:kack.itandi-Regarding the fix: use the git version that your channel is on. Same story as with random version suffixes: you still have to make a lookup to see in which one it is.14:22:18
@sandro:supersandro.deSandro

only upgrade the vulnerable packages.

Add a overlay with the change and rebuild a few hundred packages.

14:30:27
@sandro:supersandro.deSandro

I feel like there should be a way to do a security audit on a system to determine if it's vulnerable other than upgrading every package.

One of the problems is that the data on vurnabilities is from time to time not that great. I think ImageMagick is a good example where CVEs regularly have wrong version ranges.

14:32:33
@henson:matrix.orgHenson Sandro: yeah, it would vary based on how dependent other packages are on the thing being fixed. In my sudo case it was only one package, but I can see it just being more worth it to upgrade everything, especially if your change makes it so you can't fetch from the binary cache. 14:33:09
@sandro:supersandro.deSandro

Isn't determining if a system is vulnerable and only upgrading it if necessary (or perhaps only the vulnerable packages if possible) something that people do in practice?

Maybe in some enterprisy environment. I am just riding the latest and greatest on all machines.

14:33:58
@sandro:supersandro.deSandroredhats rpm has a feature where you can upgrade all packages that belong into a CVE. Problem with that is when the CVE data is not perfect you might miss something and it also encourages to stay on some stone age old version because we do not have the CVE.14:35:10
@sandro:supersandro.deSandro
In reply to @henson:matrix.org
Sandro: yeah, it would vary based on how dependent other packages are on the thing being fixed. In my sudo case it was only one package, but I can see it just being more worth it to upgrade everything, especially if your change makes it so you can't fetch from the binary cache.
if you are using the stable release such security patches get normally backported and then you should be able to use the binary cache.
14:36:02
@sandro:supersandro.deSandrobut I am personal normally on unstable and for packages on master so upgrading everything is just easier and saves me time.14:36:41
@r_i_s:matrix.orgris_ Henson: you're aware of vulnix aren't you? 19:42:29
@r_i_s:matrix.orgris_also the whole "sniffing patch names for CVE ids" thing is a fairly well trodden path in nix19:44:06
@hexa:lossy.networkhexatbh, it's why I don't rely on channels19:51:38
@hexa:lossy.networkhexamy servers track the nixos-$release branches via niv, and my workstations run from a git checkout of master19:52:11
@hexa:lossy.networkhexa can always just git log --grep=CVE... 19:52:23
@henson:matrix.orgHenson ris_: no I'm not aware of vulnix 20:19:34
* @henson:matrix.orgHenson searches for it20:19:48
@r_i_s:matrix.orgris_it sounds quite a lot like what you're looking for20:20:02
@henson:matrix.orgHenson ris_: is it the hacklab vulnix thing, or something else? 20:20:58
@r_i_s:matrix.orgris_https://github.com/flyingcircusio/vulnix20:21:22
@henson:matrix.orgHenson ris_: awesome, I'll look into that 20:21:54
@henson:matrix.orgHenson hexa: have you ever encountered the need to only upgrade parts of your system (like what I described about updating sudo while intentionally keeping the rest of the system at an older NixOS version?) 20:23:05
@hexa:lossy.networkhexa Henson: I use overlays for a few things, yeah 20:23:33
@henson:matrix.orgHenson hexa: thanks for the suggestion of using niv and the git checkouts. Do you incorporate niv/git into your root user's channels, or import them into the system configuration? 20:25:38
@hexa:lossy.networkhexa Henson: using niv for my servers integrated with morph 20:25:58
@hexa:lossy.networkhexamy workstations have a git checkout at /etc/nixpkgs (whoops)20:26:24

Show newer messages


Back to Room ListRoom Version: 6