!ZRgXNaHrdpGqwUnGnj:nixos.org

NixOS Security Triage

708 Members
Coordination and triage of security issues in nixpkgs218 Servers

Load older messages


SenderMessageTime
25 Mar 2024
@admin:nixos.org@admin:nixos.org left the room.00:30:35
@r_i_s:matrix.orgris_https://github.com/NixOS/nixpkgs/pull/29754720:14:15
@hexa:lossy.networkhexawow, this looks like code copy pasted from home-assistant 😄 20:30:09
@hexa:lossy.networkhexawhich can be explained because bdraco was involved20:30:32
26 Mar 2024
@hexa:lossy.networkhexa https://webkitgtk.org/security/WSA-2024-0002.html Jan Tojnar 03:22:18
@linucifer:envs.net@linucifer:envs.net joined the room.19:09:13
@pinpox:matrix.orgpinpoxNot sure if this is the right place to ask, but are current NixOS versions impacted by https://github.com/Notselwyn/CVE-2024-1086 ? 20:33:53
@k900:0upti.meK900Mo20:34:38
@k900:0upti.meK900* No20:34:45
@k900:0upti.meK900

The exploit affects versions from (including) v5.14 to (including) v6.6, excluding patched branches v5.15.149>, v6.1.76>, v6.6.15>

20:35:11
@r_i_s:matrix.orgris_at last https://github.com/NixOS/nixpkgs/pull/29596723:05:56
27 Mar 2024
@jtojnar:matrix.orgJan Tojnarhttps://github.com/NixOS/nixpkgs/pull/29941705:44:09
@tgerbet:matrix.orgtgerbethttps://www.openwall.com/lists/oss-security/2024/03/27/5 util-linux 2.40 was released with the fix https://github.com/util-linux/util-linux/commit/404b0781f52f7c045ca811b2dceec526408ac25321:06:20
@tgerbet:matrix.orgtgerbetAnd curl 8.7.1 https://github.com/NixOS/nixpkgs/pull/29958021:07:22
@tgerbet:matrix.orgtgerbetWell https://www.openwall.com/lists/oss-security/2024/03/27/7 😅21:48:07
29 Mar 2024
@sebtm:lodere.esSebTM joined the room.04:23:38
@vcunat:matrix.orgvcunathttps://github.com/NixOS/nixpkgs/commit/c2b0bf3dd525#commitcomment-14036563406:36:33
@vcunat:matrix.orgvcunat (in case someone's interested in .mlflow for NixOS 23.11) 06:37:06
@clefru:matrix.orgclefruRedacted or Malformed Event08:53:25
@clefru:matrix.orgclefru* FYI from what I see, the two 0 days for Google Chrome published on Tuesday are still unpatched in release-23.11. 08:53:45
@clefru:matrix.orgclefruRedacted or Malformed Event09:00:49
@clefru:matrix.orgclefruSorry ignore that.. I am tracking nixos-23.11 and not release-23.1109:05:50
@hexa:lossy.networkhexa https://www.openwall.com/lists/oss-security/2024/03/29/4 16:12:46
@phileas:asra.grsyd installs gentoo (they/them)
In reply to @hexa:lossy.network
https://www.openwall.com/lists/oss-security/2024/03/29/4
b) argv[0] needs to be /usr/sbin/sshd
16:15:35
@phileas:asra.grsyd installs gentoo (they/them)
In reply to @hexa:lossy.network
https://www.openwall.com/lists/oss-security/2024/03/29/4
*

b) argv[0] needs to be /usr/sbin/sshd

ldd $(which sshd) | grep -i lzma doesn't link against lzma

16:19:17
@phileas:asra.grsyd installs gentoo (they/them) *

b) argv[0] needs to be /usr/sbin/sshd

ldd $(which sshd) | grep -i lzma doesn't link against lzma

https://github.com/NixOS/nixpkgs/blob/master/pkgs/tools/compression/xz/default.nix

is on the affected version 5.6.1

16:20:24
@phileas:asra.grsyd installs gentoo (they/them) *

b) argv[0] needs to be /usr/sbin/sshd

ldd $(which sshd) | grep -i lzma doesn't link against lzma

https://github.com/NixOS/nixpkgs/blob/master/pkgs/tools/compression/xz/default.nix

is on the affected version 5.6.1 (5.4.4 on 23.11)

16:21:00
@phileas:asra.grsyd installs gentoo (they/them) *

b) argv[0] needs to be /usr/sbin/sshd

ldd $(which sshd) | grep -i lzma doesn't link against lzma

https://github.com/NixOS/nixpkgs/blob/master/pkgs/tools/compression/xz/default.nix

is on the affected version 5.6.1 (5.4.4 on 23.11)

Thank you hexa https://github.com/NixOS/nixpkgs/pull/300028

16:22:08
@julienmalka:matrix.orgJulienJust saw that as well, is there a specific reason we are not building xz from the "source code" links generated from github ? If I understand correctly part of the backdoor is not present in there 16:38:11
@vcunat:matrix.orgvcunatBecause release tarballs need less dependencies to build.16:39:31

Show newer messages


Back to Room ListRoom Version: 6