!ZRgXNaHrdpGqwUnGnj:nixos.org

NixOS Security Triage

739 Members
Coordination and triage of security issues in nixpkgs230 Servers

Load older messages


SenderMessageTime
8 Jun 2021
@hexa:lossy.networkhexahttps://github.com/NixOS/nixpkgs/pull/12627121:31:55
@hexa:lossy.networkhexathis is not a proper fix, since it introduces a regression into the release21:34:07
@hexa:lossy.networkhexabut fixing up p11-kit/cacert is going to take a while21:34:17
@hexa:lossy.networkhexahttps://nvd.nist.gov/vuln/detail/CVE-2021-2020122:58:16
@hexa:lossy.networkhexafixed in spice >= 0.14.92, which is not a public release yet22:58:40
@hexa:lossy.networkhexahttps://nvd.nist.gov/vuln/detail/CVE-2020-1435522:59:29
@hexa:lossy.networkhexafixed in spice-gtk >= 0.14.2-1, no public release yet22:59:49
9 Jun 2021
@hexa:lossy.networkhexahttps://github.com/NixOS/nixpkgs/pull/12629101:34:44
@pennae:matrix.eno.spacepennaeoh nice, 5th-gen doesn't get updates? :D01:52:11
@kranzes:matrix.orgkranzes left the room.13:31:32
@scr1bbles:matrix.orgscr1bbles joined the room.14:11:15
10 Jun 2021
@leo:gaspard.ninjaEkleog joined the room.16:25:29
@hexa:lossy.networkhexayeah, I guess our capability of delivering security fixes through staging is fckd because of a lack of darwin builders20:15:21
@hexa:lossy.networkhexa * yeah, I guess our ability of delivering security fixes through staging is fckd because of a lack of darwin builders20:16:15
@sandro:supersandro.deSandroDemote Darwin to level 2?21:26:08
@qyliss:fairydust.spaceAlyssa Rossx86_64-darwin is tier 2 already21:27:09
11 Jun 2021
@hexa:lossy.networkhexahttps://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/00:00:29
@mkg20001:matrix.orgmkg20001 joined the room.05:46:14
@andi:kack.itandi-Thankfully nobody has mutable users, right?08:10:29
@linus.heckemann:matrix.mayflower.deLinux HackermanPretty sure there are many other ways to get root via polkit :)08:24:22
@henson:matrix.orgHensonbecause the fix for the polkit bug (https://github.com/NixOS/nixpkgs/pull/125554) is in the form of a patch without any change to the package version string, is there any way for someone to tell whether a particular system has this fix or not?11:30:54
@pennae:matrix.eno.spacepennaeyou could check the package version and the store hash that provides the running polkit11:32:44
@henson:matrix.orgHensonbut the package version will just be 0.118 both with and without the fix, right?11:34:11
@synthetica:matrix.orgSyntheticawe should really have a canonical way of denoting security patches11:35:24
@pennae:matrix.eno.spacepennae Henson: yeah, but the store hash will be different (and only one of them will be vulnerable) 11:35:46
@pennae:matrix.eno.spacepennaewould be better to have a marker though11:35:58
@henson:matrix.orgHenson pennae: yes, to tell from the store hash you'd have to download a known fixed version and compare the hash. And if they're different, that doesn't necessarily mean the other one is vulnerable, as the store hash could change based on some other non-patch-related build dependency of polkit 11:37:20
@pennae:matrix.eno.spacepennaetrue, that way you can only really identify something that is for-sure broken11:39:00
@sandro:supersandro.deSandro

I have a better idea:

cat /nix/var/nix/profiles/per-user/$USER/channels/nixos/.version-suffix | cut -d. -f2 and then check if that short hash includes the commit you need

11:40:28
@sandro:supersandro.deSandropretty easy and uses existing stuff we already have11:40:47

Show newer messages


Back to Room ListRoom Version: 6