NixOS Security Triage | 692 Members | |
| Coordination and triage of security issues in nixpkgs | 215 Servers |
| Sender | Message | Time |
|---|---|---|
| 3 Jul 2024 | ||
| https://mastodon.social/@MastodonEngineering/112717731749830186 mastodon, 2024-07-04 16:00 UTC | 13:16:04 | |
| * 15:00 UTC | 13:21:50 | |
| https://github.com/NixOS/nixpkgs/pull/324349 https://meta.discourse.org/t/3-2-3-security-and-bug-fix-release/313392 | 15:22:47 | |
| https://github.com/NixOS/nixpkgs/pull/324371 | 16:04:16 | |
| 19:11:43 | ||
| 21:28:15 | ||
| 4 Jul 2024 | ||
| 10:58:00 | ||
| https://github.com/mastodon/mastodon/releases/tag/v4.2.10 | 15:05:18 | |
| maintainer is working on it | 15:09:02 | |
| (kerstin) | 15:09:03 | |
| https://github.com/NixOS/nixpkgs/pull/324586 merged into master, unstable-small eval trigggered | 15:39:17 | |
| https://github.com/NixOS/nixpkgs/pull/324587 still running tests | 15:39:23 | |
| 15:45:55 | ||
| 15:55:52 | ||
| * https://github.com/NixOS/nixpkgs/pull/324587 merged into release-24.05, nixos-24.05-small eval triggered | 15:59:31 | |
| 16:01:33 | ||
| 19:10:30 | ||
| 5 Jul 2024 | ||
| Hey,
Which doesn't really make sense to me, because the original CVE applied to BIOS systems mostly. So leaving BIOS systems the same wouldn't fix the issue. Someone reported this here, I could reproduce this with the latest Nixos-GNOME ISO, with the following steps:
After the installation is done, there is an luks-keyfile in an zstd/cpio archive in /boot/kernels/***-secrets, which does open the root partition. | 11:36:34 | |
| thank you for the report | 11:48:34 | |
| https://github.com/NixOS/calamares-nixos-extensions/pull/25 says "#21 broke encrypted swap by mishandling the removal of crypto_keyfile.bin. This reverts the original fix. Instead, we leave BIOS the same; that was secure as it was before", I guess this was just a misunderstanding of the vuln? :/ | 11:49:21 | |
| maybe it's better to revert and let encrypted swap be broken while we figure out what the proper fix is? | 11:50:59 | |
| (I guess this is going to require another GHSA? it's the month of security regressions…) | 11:51:25 | |
| not an expert in this area though so I'll defer to those who are | 11:51:32 | |
| pinged elvishjerrico in #dev:nixos.org | 11:54:40 | |
| i'm confused by the reports | 11:57:01 | |
| it took me time to reload the context | 11:57:05 | |
| but BIOS GRUB users are protected by cryptodisk | 11:57:13 | |
In reply to @emilazy:matrix.org Thanks, I didn't look at the pull request yet. They also write:
Since they are specifically writing about unencrypted root partitions only, it seems like they thought it wouldn't be an issue for an encrypted root partiton? Anyway, I guess this was a misunderstanding about the vulnerability. BIOS setups were definitly affected, the GHSA did specifically say it affects "non-UEFI systems". | 11:57:52 | |
In reply to @raitobezarius:matrix.org the advisory says
| 11:58:16 | |
I guess the key there is "unencrypted /boot"? | 11:58:22 | |