!ZRgXNaHrdpGqwUnGnj:nixos.org

NixOS Security Triage

733 Members
Coordination and triage of security issues in nixpkgs228 Servers

Load older messages


SenderMessageTime
30 Apr 2026
@hexa:lossy.networkhexaDHE will only be used with dhparams anyway, so I hoped the warning would be sufficient12:59:03
@enzime:nixos.dev@enzime:nixos.devjust investigated further, it doesn't matter if the first commit is merged now as nginx will just disable DHE if DH params are not configured https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_dhparam13:22:10
@hxr404:tchncs.de@hxr404:tchncs.de left the room.13:40:15
@vinetos:matrix.orgVinetos joined the room.13:47:34
@samuel.dionne-riel:cyberus-technology.deSamuel Dionne-Rielhttps://github.com/NixOS/nixpkgs/pull/51460316:01:44
1 May 2026
@leona:leona.isleona

https://gstreamer.freedesktop.org/ 1.28.2 fixes a few high score vulnerabilities.

We already have an open PR but it’s not ready and we are on an unsupported version

06:41:45
@enzime:nixos.dev@enzime:nixos.dev left the room.06:44:02
4 May 2026
@avali:avali.zoneAnnoyingRains changed their profile picture.02:36:04
2 May 2026
@tom:dragar.deTom changed their profile picture.18:41:12
3 May 2026
@avali:avali.zoneAnnoyingRains changed their profile picture.13:02:39
@joerg:thalheim.ioMic92https://github.com/NixOS/nixpkgs/pull/516109 vaultwarden13:33:05
6 May 2026
@arcayr:mischief.expertarcayrhttps://github.com/NixOS/nixpkgs/pull/517132 apacheHttpd 2.4.66 -> 2.4.67 fixing cve-2026-23918 - https://httpd.apache.org/security/vulnerabilities_24.html / https://www.cve.org/CVERecord?id=CVE-2026-2391804:52:22
@vcunat:matrix.orgvcunat weblate is in need of backport to 25.11, in case anyone's interested.
https://github.com/NixOS/nixpkgs/pull/510728#issuecomment-4386087895
08:31:12
@lgian:erethon.comlgian joined the room.09:15:35
@pyrox:pyrox.devdish [Fox/It/She] Not critical but someone seems to be trying to do weird exfil backdoor attacks on nixpkgs via CI, see https://github.com/NixOS/nixpkgs/pull/517354 16:24:30
@pyrox:pyrox.devdish [Fox/It/She]afaik none of this works but i could be wrong so bringing it up here for visibility16:24:40
@pyrox:pyrox.devdish [Fox/It/She](it also seems to be using a very very expired webhook for exfil so i dont think this works anyways)16:25:55
@qyliss:fairydust.spaceAlyssa RossI reported the account to GitHub. An org owner could also block them from the org.16:29:05
@winter:catgirl.cloudWinter^ handling16:30:26
@tgerbet:matrix.orgtgerbetYeah they abuse a bunch of other repositories I have spotted one where they got some success, I'm reaching out to them16:31:30
@codec:fnord.cxcodec joined the room.16:33:12
@hexa:lossy.networkhexasame17:42:41
@hexa:lossy.networkhexablocked17:43:32
@williamvds:matrix.orgaveryv joined the room.19:06:21
@williamvds:matrix.orgaveryvHiya, I'm looking at handling https://github.com/NixOS/nixpkgs/issues/517209, pi-hole vuln, coming back to it after a while of neglecting it. Another contributor has been working on updating the package. Annoyingly it now depends on mbedtls 4.0, which that contributor has packaged here https://github.com/NixOS/nixpkgs/pull/509801. But they're getting nixpkgs-vet errors blocking it. Is it possible to disable nixpkgs-vet so we can get the vuln fixed and refactor later?19:17:01
@kuflierl:matrix.orgkuflierlInteresting attack. But i am quite sure that we do not build, only eval in ci and send stuff to hydra where github tokens are non-existant19:17:02
@kuflierl:matrix.orgkuflierl* Interesting attack. But i am quite sure that we do not build, only eval in ci and send builds to hydra where github tokens are non-existant19:17:52
@williamvds:matrix.orgaveryv* Hiya, I'm looking at handling https://github.com/NixOS/nixpkgs/issues/517209, pi-hole vuln, coming back to it after a while of neglecting it. Another contributor has been working on updating the package. Annoyingly it now depends on mbedtls 4.0, which that contributor has packaged here https://github.com/NixOS/nixpkgs/pull/509801. But they're getting nixpkgs-vet errors blocking it. Is it possible to disable nixpkgs-vet for the PR so we can get the vuln fixed and refactor later?19:18:04
@winter:catgirl.cloudWinterwe do not send ANYTHING to hydra from github ci.19:24:44
@hexa:lossy.networkhexatangential https://docs.lix.systems/manual/lix/stable/installation/multi-user.html#the-lix-daemon-as-a-security-non-boundary19:25:55

Show newer messages


Back to Room ListRoom Version: 6