gchristensen changed the topic of #nixos-security to: Vulnerability Roundup Issues: https://github.com/NixOS/nixpkgs/issues?utf8=%E2%9C%93&q=is%3Aissue+is%3Aopen+Vulnerability+roundup + https://broken.sh
pie_ has joined #nixos-security
aanderse has quit [Excess Flood]
aanderse has joined #nixos-security
justanotheruser has quit [Quit: WeeChat 2.4]
justanotheruser has joined #nixos-security
tokudan has quit [Quit: ZNC 1.7.3 - https://znc.in]
tokudan has joined #nixos-security
<tokudan> can we get https://github.com/NixOS/nixpkgs/pull/67639 merged, please? it's a critical vulnerability in dovecot and pigeonhole pre-login
<{^_^}> #67639 (by andir, 14 hours ago, open): [19.03] dovecot apply CVE-2019-11500 patches
<tokudan> details for that can be found here: https://dovecot.org/pipermail/dovecot/2019-August/116873.html
<andi-> tokudan: I just merged it... It feels so wrong having to merge my own PRs :/
<tokudan> yeah, i know that feeling in other projects :)
<tokudan> important to get that one merged quickyl though, it's a potential unauthenticated remote code execution...
<andi-> yeah
<tokudan> thanks for catching pigeonhole btw, i missed that yesterday, as I had to do the PR completely through the github weg interface :/
<andi-> is there a PoC yet? I only saw the perl snippet to cause out of bounds access. Haven't read further.
<tokudan> don't know. i'm pretty sure there is someone that has one, as it's valuable right now, but I don't think it's public yet
<andi-> I used to write those myself for a while last year so I could write a nixos test to verify before/after but not sure I do have the time to do that right now :/
<andi-> That docker container escape was a fun one :-)
<tokudan> the mail on the ML mentioned that it doesn't necessarily cause a crash and may need valgrind to observe, so it's probably complicated
<tokudan> not using docker, so i'm not bothered ;)
<andi-> I might be missing one patch I fear..
<tokudan> oh?
<andi-> ah no looks okay
<tokudan> i'm wondering if it's probably easier to just upgrade dovecot to the latest version on 19.03. that way we can be sure that we did not miss anything
<tokudan> just picking out the patches may be fine, but if we're on a random version instead of the typical supported versions by the vendor, we actually may miss something
<andi-> yeah, technically our version is already unsupported by the vendor.
<andi-> Fixed version: 2.3.7.2, 2.2.36.4
<andi-> so 2.3.7.x and 2.2.36.x seem to be supported right now
<tokudan> dovecot isn't known for unstable releases, so that's probably the better solution
<tokudan> i guess i'll open a PR to do that
<andi-> I am not so sure if that is a good idea... It might break in ways that we can't verify since they might have introduced config changes and users would expect it to continue working while on the same (stable) channel.
<tokudan> let's ask the guys who should know that about their version scheme :)
<tokudan> andi-, well, i guess you can read it in their channel, it shouldn't cause any issues while we're in the same major version and an update to 2.3.7.2 is the same major version
<tokudan> so I'll open that PR
<andi-> ok
<andi-> In the last weeks/months I've come across a bunch of packages where I thought that before branch-off we might want to mark them as unsupported (not yet insecure) just so people know what they get themselfes into
<andi-> tokudan: ping me once you opened that PR
<tokudan> andi-, will do, wont happen before evening though, as i have to work right now
<adisbladis> andi-: Speaking of Docker container escape... I'm tempted to migrate the Nixos declarative Docker container stuff to Podman/runc
<adisbladis> At least I think it's worth to explore the option
<andi-> adisbladis: it is definitly an attractive alternative. I saw some issues with that lately (as are to be expected) but mostly it seems to work just fine.
<andi-> adisbladis: what are your issues with systemd-nspawn?
<adisbladis> andi-: What's cool is that we could further contain podman with systemd, so even in the case of a container escape you'd still end up in a pretty restricted environment
<adisbladis> andi-: Hmm, nothing.
<adisbladis> I just tend to forget they now support OCI
<adisbladis> systemd-nspawn is also an appealing option
<andi-> the documentation isn't that great. I tried to find something on that a few months ago
<adisbladis> Either way I _really_ dislike our current implementation
<andi-> go for it :-)
<flokli> adisbladis: while changing it, make sure to fix networking too :-D
<{^_^}> #49534 (by Mic92, 43 weeks ago, open): Networkd cannot match interface types
tilpner_ has joined #nixos-security
tilpner has quit [Read error: Connection reset by peer]
<pie_> is it poossible to get nixto list the required downloads for a build so as to work withan airgapped system?
<pie_> I wonder if there would be a reasonable way to construct a data diode for the nix store
<gchristensen> eh?
<gchristensen> yeah, you can query all the requisites for a `.drv`
<pie_> (also sorry forr all the typos, im on a small hard to use keyboard for the forseeable future)
Synthetica has joined #nixos-security
aanderse has quit [Remote host closed the connection]
aanderse has joined #nixos-security
<tokudan> andi-, just shoved it into ofborg: https://github.com/NixOS/nixpkgs/pull/67698 :)
<{^_^}> #67698 (by tokudan, 2 minutes ago, open): [19.03] dovecot: 2.3.5.7 -> 2.3.7.2, pigeonhole: 0.5.5 -> 0.5.7.2
<andi-> tokudan: thanks, checking
justanotheruser has quit [Quit: WeeChat 2.4]
<andi-> tokudan: +1 from my side, tests pass and the diff looks sane
justanotheruser has joined #nixos-security
<tokudan> andi-, so only the regular maintainers have to approve now ,i guess
<andi-> I hope they give a sign of approval :-)
<andi-> fpletz: ^
globin has joined #nixos-security
tilpner_ is now known as tilpner
aminechikhaoui has quit [Quit: The Lounge - https://thelounge.github.io]
aminechikhaoui has joined #nixos-security
hmpffff has joined #nixos-security
hmpffff has quit [Quit: nchrrrr…]
hmpffff has joined #nixos-security
hmpffff has quit [Client Quit]
hmpffff has joined #nixos-security
hmpffff has quit [Client Quit]
pie_ has quit [Ping timeout: 252 seconds]
hmpffff has joined #nixos-security
hmpffff has quit [Client Quit]
hmpffff has joined #nixos-security
hmpffff has quit [Client Quit]
hmpffff has joined #nixos-security
<andi-> https://www.openwall.com/lists/oss-security/2019/08/28/2 I wish that ghostscript fork with maintainable versions would magically mainfest somehow
Synthetica has quit [Quit: Connection closed for inactivity]
hmpffff has quit [Quit: nchrrrr…]
hmpffff has joined #nixos-security
hmpffff has quit [Client Quit]
pie_ has joined #nixos-security