!ZRgXNaHrdpGqwUnGnj:nixos.org

NixOS Security Triage

672 Members
Coordination and triage of security issues in nixpkgs | Discussions in #security-discuss:nixos.org | Open PRs: https://github.com/NixOS/nixpkgs/pulls?q=is%3Apr+is%3Aopen+sort%3Aupdated-desc+label%3A%221.severity%3A+security%22210 Servers

Load older messages


SenderMessageTime
22 Nov 2025
@hexa:lossy.networkhexahttp://github.com/nixos/nixpkgs/pull/46398713:32:11
23 Nov 2025
@easel:matrix.org@easel:matrix.org left the room.01:50:39
24 Nov 2025
@amadaluzia:unredacted.orgamadaluzia changed their display name from amadaluzia (🇹🇷 til 25th) to amadaluzia.12:57:50
25 Nov 2025
@steeringwheelrules:tchncs.de@steeringwheelrules:tchncs.de left the room.18:12:22
26 Nov 2025
@mdaniels5757:matrix.orgmdaniels5757These PRs with security updates to packages (or their dependencies) have been approved by their respective maintainers, but still need to be merged. https://github.com/NixOS/nixpkgs/pull/463918 https://github.com/NixOS/nixpkgs/pull/464033 https://github.com/NixOS/nixpkgs/pull/46445102:38:48
@pyrox:pyrox.devdish [Fox/It/She]
In reply to @mdaniels5757:matrix.org
These PRs with security updates to packages (or their dependencies) have been approved by their respective maintainers, but still need to be merged. https://github.com/NixOS/nixpkgs/pull/463918 https://github.com/NixOS/nixpkgs/pull/464033 https://github.com/NixOS/nixpkgs/pull/464451
queued all, thank you
02:52:06
@hexa:lossy.networkhexahttps://www.cve.org/CVERecord?id=CVE-2025-4531119:41:10
@hexa:lossy.networkhexa* https://www.cve.org/CVERecord?id=CVE-2025-45311 fail2ban rce19:41:16
@hexa:lossy.networkhexa* https://www.cve.org/CVERecord?id=CVE-2025-45311 fail2ban19:42:54
@hexa:lossy.networkhexahttps://lobste.rs/s/p5k6aa/fail2ban_rce open discussion here19:43:01
@k900:0upti.meK900Something something petard19:43:02
@vcunat:matrix.orgvcunat

Why is it called RCE? They write

attackers with limited sudo privileges

19:43:47
@vcunat:matrix.orgvcunatThat's like a completely different level of severity.19:44:12
@hexa:lossy.networkhexaposted it before reading it fully, doesn't make sense to me yet, sorry19:44:51
@mdaniels5757:matrix.orgmdaniels5757The "vuln"s listed are different. On https://packetstorm.news/files/id/189989, the "vuln" is that when you set an arbitrary shell command to run when an IP is banned, and then an IP is banned, the arbitrary shells script runs. But on https://gist.github.com/R-Security/1c707a08f9c7f9a91d9d84b5010aaed2, it claims that there is "insufficient sanitization of variables", I see no evidence of that provided. CVE slop?20:42:47
@mdaniels5757:matrix.orgmdaniels5757I'll file an issue with upstream and see what they say.20:43:35
@mdaniels5757:matrix.orgmdaniels5757https://github.com/fail2ban/fail2ban/issues/411020:58:18
@hexa:lossy.networkhexahttps://nlnetlabs.nl/news/2025/Nov/26/unbound-1.24.2-released/21:32:26
@hexa:lossy.networkhexasomething more actionable21:32:33
@scrumplex:duckhub.ioScrumplex
In reply to @hexa:lossy.network
something more actionable
Has already been merged into staging. Currently building 25.05 and 25.11 backports
22:12:34
@scrumplex:duckhub.ioScrumplex *

Has already been merged into staging. Currently building 25.05 and 25.11 backports

Edit: https://github.com/NixOS/nixpkgs/pull/465262

22:13:53
27 Nov 2025
@robert:funklause.dedotlambdahttps://github.com/NixOS/nixpkgs/pull/445729#issuecomment-358362084600:20:14
@robert:funklause.dedotlambdahttps://github.com/NixOS/nixpkgs/pull/46543300:21:08
@conatsera:matrix.orgconatsera joined the room.03:14:14
@hexa:lossy.networkhexahttps://github.com/OpenPrinting/cups/releases/tag/v2.4.1515:33:22
@hexa:lossy.networkhexawell, denial of service15:33:58
@hexa:lossy.networkhexaif you expose a cupsd that wide 🤷15:34:06
19 May 2021
@grahamc:nixos.org@grahamc:nixos.org set the history visibility to "world_readable".22:57:54
@grahamc:nixos.org@grahamc:nixos.org changed the room name to "" from "".22:57:54
@andreas.schraegle:helsinki-systems.deajs124 joined the room.22:58:46

Show newer messages


Back to Room ListRoom Version: 6