!ZRgXNaHrdpGqwUnGnj:nixos.org

NixOS Security Triage

660 Members
Coordination and triage of security issues in nixpkgs | Discussions in #security-discuss:nixos.org | Open PRs: https://github.com/NixOS/nixpkgs/pulls?q=is%3Apr+is%3Aopen+sort%3Aupdated-desc+label%3A%221.severity%3A+security%22202 Servers

You have reached the beginning of time (for this room).


SenderMessageTime
24 Jan 2025
@emilazy:matrix.orgemilyIMO just drop SDL1 from there in general, highly doubt anything we package as an appimage needs it. (continue in the security discussions room?)11:56:42
@tgerbet:matrix.orgtgerbetDebian tracker lists the commit introducing the issue https://security-tracker.debian.org/tracker/CVE-2022-27470 Might want to check if it really impacts SDL1, I'm on mobile it is annoying to do (But yeah dropping old stuff like that is needed)12:04:33
@emilazy:matrix.orgemilyI think the answer to "is a 90s-vintage TTF-handling library from a previous deprecated major version vulnerable to malicious TTF files" is "yes", no code diving required12:06:08
@emilazy:matrix.orgemilythankfully in most usecases that's going to be a wrong-side-of-the-airtight-hatchway thing; games generally don't let your network opponent supply their own font12:06:23
@emilazy:matrix.orgemilybut it's still not great12:08:02
@emilazy:matrix.orgemily(oops, this is triage room again)12:08:02

Show newer messages


Back to Room ListRoom Version: 6