00:03
zarco has quit [Ping timeout: 260 seconds]
00:04
zarco has joined #nixos-security
01:38
ris has quit [Ping timeout: 256 seconds]
02:09
justan0theruser has quit [Quit: WeeChat 2.9]
02:14
justanotheruser has joined #nixos-security
04:00
ninjin has quit [Remote host closed the connection]
04:01
ninjin has joined #nixos-security
04:53
<
__red__ >
PR: #102706 fixes 8 security issues. (... and, a: I'm the maintainer of the package. b: It's the same package that's already in master (so this is a backport))
04:55
<
__red__ >
What's the pol,icy for backporting ?
04:55
<
__red__ >
how many releases vback do we do?
04:59
<
__red__ >
actually make that one
05:00
<
__red__ >
apparently thehre's a whole lot more branches than IO thought argh
05:03
<
__red__ >
should I bve backporting to 20.03?
05:20
<
__red__ >
Well, opened up a PR against that too
05:20
<
__red__ >
hopefully that's correct
06:11
swapgs has quit [Quit: .]
06:13
swapgs has joined #nixos-security
06:13
swapgs has joined #nixos-security
06:59
<
__red__ >
I'm working on bringing a package up to date
06:59
<
__red__ >
specifically styx
07:02
<
__red__ >
nm - it may be a misidfentification
08:23
FRidh has joined #nixos-security
09:55
sphalerite has quit [Ping timeout: 260 seconds]
09:55
immae has quit [Ping timeout: 272 seconds]
09:55
hexa- has quit [Ping timeout: 272 seconds]
09:56
bennofs has quit [Ping timeout: 272 seconds]
09:57
bennofs has joined #nixos-security
09:57
immae has joined #nixos-security
09:57
sphalerite has joined #nixos-security
10:09
hexa- has joined #nixos-security
10:49
ninjin has quit [Ping timeout: 240 seconds]
10:54
ninjin has joined #nixos-security
11:03
rajivr has joined #nixos-security
11:36
FRidh has quit [Remote host closed the connection]
11:40
FRidh has joined #nixos-security
11:55
GUEST1604490921 has joined #nixos-security
11:58
GUEST1604490921 has quit [Read error: Connection reset by peer]
11:58
GUEST1604491118 has joined #nixos-security
11:59
GUEST1604491118 has quit [Read error: Connection reset by peer]
12:00
GUEST1604491197 has joined #nixos-security
12:01
GUEST1604491197 has quit [Read error: Connection reset by peer]
12:01
GUEST1604491290 has joined #nixos-security
12:04
GUEST1604491290 has quit [Read error: Connection reset by peer]
12:05
GUEST1604491541 has joined #nixos-security
12:07
GUEST1604491541 has quit [Remote host closed the connection]
12:10
GUEST91807 has joined #nixos-security
12:14
GUEST91807 has quit [Ping timeout: 260 seconds]
12:39
GUEST93534 has joined #nixos-security
12:43
GUEST93534 has quit [Ping timeout: 244 seconds]
12:46
GUEST93997 has joined #nixos-security
12:58
GUEST93997 has quit [Read error: Connection reset by peer]
13:00
GUEST94796 has joined #nixos-security
13:00
GUEST94796 has quit [Read error: Connection reset by peer]
13:01
GUEST94894 has joined #nixos-security
13:02
GUEST94894 has quit [Read error: Connection reset by peer]
13:02
GUEST94946 has joined #nixos-security
13:08
GUEST94946 has quit [Remote host closed the connection]
13:08
GUEST95299 has joined #nixos-security
13:46
<
__red__ >
Okay - I'm going to keep backporting to 20.03 until either it freezes or people tell me that I should stop
13:52
<
hexa- >
__red__: it's supported until 1 month after 20.09 release
13:55
GUEST95299 has quit [Remote host closed the connection]
14:54
lukegb has quit [Ping timeout: 265 seconds]
16:25
lukegb has joined #nixos-security
16:38
FRidh has quit [Quit: Konversation terminated!]
17:52
rajivr has quit [Quit: Connection closed for inactivity]
19:01
<
__red__ >
thanks hexa- andi-
19:01
justanotheruser has quit [Ping timeout: 272 seconds]
19:03
ris has joined #nixos-security
19:11
<
__red__ >
Okay - I'm working my way through my queue
19:11
<
__red__ >
lots of corrections, but that's what review is for
19:15
ris has quit [Ping timeout: 256 seconds]
19:29
<
__red__ >
So, if I want someone to "check my work" before I close a security vuln issue - is there a way to tag the issue for feedback?
19:29
<
__red__ >
I'm guessing not @maintainers
19:29
<
__red__ >
is there a security equivalent?
19:30
<
hexa- >
post it here
19:32
<
__red__ >
okay - thx
19:35
<
__red__ >
#99717 - advancecomp
19:36
<
__red__ >
if I see something in the default.nix as blatent as:
19:36
<
__red__ >
patches = [
19:36
<
__red__ >
name = "CVE-2019-9210.patch";
19:36
<
__red__ >
(fetchpatch {
19:36
<
__red__ >
... and a PR labelled "fix CVE-2019-9210"
19:36
<
__red__ >
then I don't need to double-verify everything right?
19:36
<
__red__ >
we just assume it's still good
19:37
<
__red__ >
(since it's an automatic vuln detection based upon version)
19:45
<
andi- >
Well verify that the url points to the correct patch and not a backdoor ;)
19:45
<
andi- >
and maybe verify the checksum
20:03
ris has joined #nixos-security
20:30
justanotheruser has joined #nixos-security
20:41
<
__red__ >
#96781 - upstream is broken. Submodule reference doesn't seem to exist anymore so it breaks on minimum bump. I tagged the maintainer to ask what they want to do next.
20:46
<
__red__ >
#99730 - Closing as a false positive. Not a HP network device, but a media player application.
23:03
<
__red__ >
ant: nixpkgs-unstable: ant-1.10.8 101143
23:03
<
__red__ >
PR raised
23:04
<
__red__ >
ant: nixos-20.09: ant-1.10.8 101143
23:04
<
__red__ >
PR raised
23:04
<
__red__ >
(both to 1.10.9)
23:18
<
__red__ >
ant: nixos-20.03: ant-1.10.2 88268
23:18
<
__red__ >
PR raised (again, 1.10.9)