| 6 Sep 2024 |
hexa | (pretty sure they are aware) | 17:01:10 |
hexa | * (pretty sure they are aware, but still) | 17:01:14 |
emily | (wrong emily?) | 17:01:17 |
emily | emily: | 17:01:19 |
hexa | E_TOOMANYEMILIES | 17:01:32 |
hexa | * E_TOOMANYEMILYS | 17:01:42 |
networkException | M_NOT_ENOUGH_EMILYS | 17:26:36 |
adamcstephens | merged | 21:26:16 |
| 7 Sep 2024 |
hexa | https://seclists.org/tcpdump/2024/q3/3 | 03:30:00 |
Markus Theil | After fixing some build issues of systemd dependencies, the OpenSSL update is now ready for review from my side: https://github.com/NixOS/nixpkgs/pull/339614 | 09:20:38 |
Markus Theil | OpenSSL increased the default security level from version line to version line: https://docs.openssl.org/1.1.1/man3/SSL_CTX_set_security_level/
With OpenSSL 3.2+ the default is 2. | 09:27:56 |
Markus Theil | Should we define this to a lower default or should users deal with it? | 09:28:19 |
Markus Theil | 3.0.x used level 1. | 09:29:53 |
emily | In reply to @mtheil:scs.ems.host Should we define this to a lower default or should users deal with it? let's not opt in to worse security, users can deal with it unless it causes mass breakage | 10:44:16 |
emily | not even mail servers should be using SSL 3.0 or 1024-bit RSA | 10:45:25 |
emily | (let's move this to the non triage room though?) | 10:46:53 |
| @vincenttc:matrix.org left the room. | 16:19:37 |
qubitnano | https://community.ui.com/releases/Security-Advisory-Bulletin-042-042/c4f68b56-cdc4-4128-b2cb-5870209d1704 | 16:19:42 |
qubitnano | Just need to backport 8.4 to 24.05 and drop unifi7, right? | 16:25:41 |
hexa | "just" 🙂 | 16:26:43 |
hexa | talk to the maintainers globin patryk4815 | 16:27:13 |
| 9 Sep 2024 |
| @david:matrix.galvanix.com left the room. | 17:54:26 |
hexa | https://github.com/NixOS/nixpkgs/pull/340852 | 19:55:45 |
| @vengmark2:matrix.org joined the room. | 20:39:55 |
| @vengmark2:matrix.org left the room. | 20:40:51 |
ma27 | backport for that: https://github.com/NixOS/nixpkgs/pull/340868
prepared a small advisory, will publish when these hit the channels. | 21:17:45 |
| 10 Sep 2024 |
hexa | https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240910 | 18:36:19 |
| 11 Sep 2024 |
hexa | https://curl.se/docs/CVE-2024-8096.html | 12:35:28 |
hexa | * https://curl.se/docs/CVE-2024-8096.html curl w/ gnutls | 12:35:50 |
K900 | Steam no longer affected :P | 12:36:18 |