-
-
Notifications
You must be signed in to change notification settings - Fork 15.4k
Fix multiple cves #31437
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix multiple cves #31437
Conversation
Fix is based on work at [1] which upstream seems to have implemented as seen at [2]. [1] https://github.com/antirez/redis/pull/4365 [2] antirez/redis@ffcf7d5
Yet another tool to list CVEs for our packages :-) |
Not just CVEs, also "upstream" version changes from e.g. release-monitoring.org... :-) |
That reminds me of https://github.com/Phreedom/nixpkgs-monitor |
cc @NixOS/security-notifications on both the specific fixes and the tool |
|
||
src = fetchFromGitHub { | ||
owner = "Thomas-Tsai"; | ||
repo = "partclone"; | ||
rev = version; | ||
sha256 = "0gw47pchqshhm00yf34qgxh6bh2jfryv0sm7ghwn77bv5gzwr481"; | ||
sha256 = "1gw47pchqshhm00yf34qgxh6bh2jfryv0sm7ghwn77bv5gzwr481"; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This sha256 is invalid, it should be 0bv15i0gxym4dv48rgaavh8p94waryn1l6viis6qh5zm9cd08skg
.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
OK, with some additional changes.
sha256 = "0jcjlx9ksdvxvjyxmyzscx9ar9992iy5icw0sc3n0p09qi4d6x1r"; | ||
}) | ||
]; | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
For non-generated patches it seems better to use fetchurl
, but let's keep this as it is.
Thank you for working on and merging this! |
Motivation for this change
I created a new tool to generate a list of packages affected by CVEs and started working through the list for the unstable channel.
This is just the ones that seemed fixable and where proper upstream commits/patches could be found.
The complete list from my WIP tool can be found here.
Some of the commits might be worth backporting to stable.
I am not so sure about the others since they might involve bumping versions. Is that something we do for an already released stable version?
Things done
build-use-sandbox
innix.conf
on non-NixOS)nix-shell -p nox --run "nox-review wip"
./result/bin/
)