bug#47257: [PATCH v3] gnu: mariadb: Fix CVE-2021-27928.

2021-03-25 Thread Léo Le Bouter via Bug reports for GNU Guix
On Thu, 2021-03-25 at 21:16 -0400, Mark H Weaver wrote: > > Looks good to me. Please push. Thank you! > > Mark Thank you for the review, pushed as 52c8d07a4f7033534a71ac7efeec21a65d35c125. signature.asc Description: This is a digitally signed message part

bug#47398: generic-html updater does not work for exiv2 package

2021-03-25 Thread Léo Le Bouter via Bug reports for GNU Guix
$ ./pre-inst-env guix refresh exiv2 gnu/packages/image.scm:1343:2: warning: 'generic-html' updater failed to determine available releases for exiv2 It seems applying this patch does not help either: diff --git a/gnu/packages/image.scm b/gnu/packages/image.scm index d04a247976..8ede48eea5 100644

bug#47375: guix test failure: tests/print

2021-03-25 Thread Léo Le Bouter via Bug reports for GNU Guix
On Fri, 2021-03-26 at 00:24 +0100, Ludovic Courtès wrote: > Léo Le Bouter skribis: > > > Full log: https://ci.guix.gnu.org/build/117996/log/raw > > Speaking of which: please always build packages before pushing. :-) > > Thanks, > Ludo’. I ran 'guix pull' but turn

bug#47257: [PATCH v3] gnu: mariadb: Fix CVE-2021-27928.

2021-03-25 Thread Léo Le Bouter via Bug reports for GNU Guix
v3 tested and builds fine: $ ./pre-inst-env guix build mariadb /gnu/store/f70jymwyfcnsghy4jg8caibci59p8rgq-mariadb-10.5.8-dev /gnu/store/cj3qym1x1jjh02m2g23cqpbhchrbmn6c-mariadb-10.5.8-lib /gnu/store/mpb5bdf1vkwazqfmmwcvskdm50g191bg-mariadb-10.5.8 Since we don't have PoC, I can't verify the

bug#47257: [PATCH v3] gnu: mariadb: Fix CVE-2021-27928.

2021-03-25 Thread Léo Le Bouter via Bug reports for GNU Guix
* gnu/packages/patches/mariadb-CVE-2021-27928.patch: New patch. * gnu/local.mk (dist_patch_DATA): Register it. * gnu/packages/databases.scm (mariadb/fixed): New variable. Apply patch. (mariadb)[replacement]: Graft. --- gnu/local.mk | 1 +

bug#47257: mariadb is vulnerable to CVE-2021-27928 (RCE)

2021-03-25 Thread Léo Le Bouter via Bug reports for GNU Guix
On Fri, 2021-03-19 at 12:35 +0100, zimoun wrote: > Instead of grafting, I would fix first check the compatibility > between > mariadb and zstd. Because mariadb@10.5.8 does not build with > zstd@1.4.9, at least on my machine. Can you post build logs and repro scenario? mariadb@10.5.8 built fine

bug#47257: [PATCH v2] gnu: mariadb: Fix CVE-2021-27928.

2021-03-25 Thread Léo Le Bouter via Bug reports for GNU Guix
* gnu/packages/patches/mariadb-CVE-2021-27928.patch: New patch. * gnu/local.mk (dist_patch_DATA): Register it. * gnu/packages/databases.scm (mariadb/fixed): New variable. Apply patch. (mariadb)[replacement]: Graft. --- gnu/local.mk | 1 +

bug#47375: guix test failure: tests/print

2021-03-24 Thread Léo Le Bouter via Bug reports for GNU Guix
FAIL: tests/print = test-name: simple package location: /tmp/guix-build-guix-1.2.0-18.86dd54f.drv- 0/source/tests/print.scm:70 source: + (test-equal + "simple package" + `(define-public test ,pkg-source) + (package->code pkg)) expected-value: (define-public test (package

bug#47231: sqlite package is vulnerable to CVE-2020-11655, CVE-2020-11656, CVE-2020-13434, CVE-2020-13435, CVE-2020-13630, CVE-2020-13631, CVE-2020-13632, CVE-2020-15358 and CVE-2020-9327

2021-03-24 Thread Léo Le Bouter via Bug reports for GNU Guix
("guile" ,guile-3.0-latest) It worked fine. Is that enough of a test to graft in master? Let me know and I will push. Léo signature.asc Description: This is a digitally signed message part

Re: Help with zig package

2021-03-24 Thread Léo Le Bouter
On Thu, 2021-03-25 at 00:08 +0530, Dhruvin Gandhi wrote: > Hello Guix, > > I've been working on building latest zig compiler toolchain (0.7.1) > following Simon Nielsen's work (bug#39480 for 0.5.0). > > The compiler builds correctly. But it fails during the install phase. > It is able to copy

Re: [opinion] CVE-patching is not sufficient for package security patching

2021-03-24 Thread Léo Le Bouter
On Wed, 2021-03-24 at 21:24 +0100, Vincent Legoll wrote: > Hello, > > On Wed, Mar 24, 2021 at 8:51 PM Leo Famulari > wrote: > > > We bought a handful of Overdrive 1000 in the past (they are no > > > longer > > > sold), and hosting was always an obstacle. > > > > I volunteer to host one or two

bug#47172: GNU Shepherd 0.8.1 fails on core-updates

2021-03-24 Thread Léo Le Bouter via Bug reports for GNU Guix
It seems this is due to guile 3.0.5, GNU Shepherd 0.8.1 does not work with it, it works with guile 3.0.2 however. Thanks to Efraim on IRC for hints. It would be great if people knowledgeable with Scheme, GNU Shepherd and Guile could fix it, it blocks GNOME upgrade work on top of core- updates.

Re: I have merged wip-ppc64le-for-master to master

2021-03-24 Thread Léo Le Bouter
On Tue, 2021-03-23 at 23:41 -0700, Chris Marusich wrote: > Hi, > > FYI, I have merged wip-ppc64le-for-master to master and closed bug > 47182. I have also deleted the wip-ppc64le-for-master branch. > > Later this week, I will update the manual to mention that > powerpc64le-linux is supported,

bug#47231: sqlite package is vulnerable to CVE-2020-11655, CVE-2020-11656, CVE-2020-13434, CVE-2020-13435, CVE-2020-13630, CVE-2020-13631, CVE-2020-13632, CVE-2020-15358 and CVE-2020-9327

2021-03-23 Thread Léo Le Bouter via Bug reports for GNU Guix
One more: CVE-2021-20227 23.03.21 18:15 A flaw was found in SQLite's SELECT query functionality (src/select.c). This flaw allows an attacker who is capable of running SQL queries locally on the SQLite database to cause a denial of service or possible code execution by triggering a

bug#47351: python-pygments@2.7.3 is vulnerable to at least CVE-2021-20270

2021-03-23 Thread Léo Le Bouter via Bug reports for GNU Guix
CVE-2021-20270 23.03.21 18:15 An infinite loop in SMLLexer in Pygments versions 1.5 to 2.7.3 may lead to denial of service when performing syntax highlighting of a Standard ML (SML) source file, as demonstrated by input that only contains the "exception" keyword. Upstream version 2.8.1 is not

bug#47319: python-lxml is vulnerable to CVE-2021-28957

2021-03-23 Thread Léo Le Bouter via Bug reports for GNU Guix
I pushed a9d540cfa87ef3a5de3296188f650fb0d037efbd on core-updates, how to fix it on master considering the amount of dependents remains to be agreed on. signature.asc Description: This is a digitally signed message part

A proposal for better quality in maintenance of packages by reducing scope

2021-03-23 Thread Léo Le Bouter
to be in this maintained state, for example, in the GNU Guix System configuration. Some kind of quality rating for packages that users can trust. What do you think? Léo signature.asc Description: This is a digitally signed message part

bug#47342: [PATCH 1/2] gnu: Add java-mxparser.

2021-03-23 Thread Léo Le Bouter via Bug reports for GNU Guix
* gnu/packages/xml.scm (java-mxparser): New variable. --- gnu/packages/xml.scm | 28 1 file changed, 28 insertions(+) diff --git a/gnu/packages/xml.scm b/gnu/packages/xml.scm index 2a72fc6ad2..96287b3174 100644 --- a/gnu/packages/xml.scm +++ b/gnu/packages/xml.scm @@

bug#47342: java-xstream@1.4.15 is vulnerable to CVE-2021-21341, CVE-2021-21342, CVE-2021-21343, CVE-2021-21344, CVE-2021-21345, CVE-2021-21346, CVE-2021-21347, CVE-2021-21348, CVE-2021-21349, CVE-2021

2021-03-23 Thread Léo Le Bouter via Bug reports for GNU Guix
Upstream has made a release: 1.4.16 - which fixes all the issues, following is an unfinished patchset that fixes the issues, java- mxparser package does not build and help from some more experienced Java packagers is welcome to fix and push this patchset. signature.asc Description: This is a

Re: imagemagick@6.9.11-48 to graft or not to graft with 6.9.12-2

2021-03-23 Thread Léo Le Bouter
erge with master, but I am afraid this enters in conflict with people not having lots of bandwidth to download a new world again through substitutes or very powerful machines for those who don't use substitutes. Léo signature.asc Description: This is a digitally signed message part

bug#47342: [PATCH 2/2] gnu: java-xstream: Update to 1.4.16 [security fixes].

2021-03-23 Thread Léo Le Bouter via Bug reports for GNU Guix
Fixes CVE-2021-21341, CVE-2021-21342, CVE-2021-21343, CVE-2021-21344, CVE-2021-21345, CVE-2021-21346, CVE-2021-21347, CVE-2021-21348, CVE-2021-21349, CVE-2021-21350 and CVE-2021-21351. * gnu/packages/xml.scm (java-xstream): Update to 1.4.16. [inputs]: Replace java-xpp3 with java-mxparser, the

Re: Let's include powerpc64le-linux in the next release

2021-03-23 Thread Léo Le Bouter
On Tue, 2021-03-23 at 14:42 +0100, Ludovic Courtès wrote: > Like Efraim wrote, the person who makes the release (I’m afraid it’ll > be > me) needs to be able to offload to a “trustworthy” machine for that > platform. > > If we can do that, we should adjust the ‘release’ target in > ‘Makefile.am’

Secure GNU Guix offloading

2021-03-23 Thread Léo Le Bouter
rks AFAICT, but it's not widely known how it can be used and why. What do you think? Léo signature.asc Description: This is a digitally signed message part

Re: imagemagick@6.9.11-48 to graft or not to graft with 6.9.12-2

2021-03-23 Thread Léo Le Bouter
In general my opinion is that backporting fixes is time-consuming and that if we have to do it each time I wont be able to keep up with the load. I'd rather update things to a version that already includes fixes and is supported by upstream even at the cost of world rebuilds. I can't deal with

bug#47319: python-lxml is vulnerable to CVE-2021-28957

2021-03-22 Thread Léo Le Bouter via Bug reports for GNU Guix
/2d01a1ba8984e0483ce6619b972832377f208a0d ), so we should probably upgrade to that. Has lots of dependents so I suppose it needs grafting? Is that useful and does it work for Python packages? Léo signature.asc Description: This is a digitally signed message part

Re: Make guix commands pipeable

2021-03-21 Thread Léo Le Bouter
> I do agree though that it would be nicer to just have '-' as a guix > input arg causing any guix command to read from stdin. Doesnt /dev/stdin work? The only reason it could not is that somehow the file descriptor needs to be seekable. Léo signature.asc Description: This is a dig

Re: Why [bug#47081] Remove mongodb?

2021-03-21 Thread Léo Le Bouter
Also are there actually people using the mongodb service on GNU Guix? > What do the previous > contributors to this code think—Chris, Efraim, Marius, Arun? Chris voiced their opinion saying they didnt mind removing the package, I think Efraim said that on IRC also but I am not sure, so let's

bug#47257: [PATCH 0/1] gnu: mariadb: Update to 10.5.9 [fixes CVE-2021-27928].

2021-03-19 Thread Léo Le Bouter via Bug reports for GNU Guix
/guix/drvs/hk/1awalxmnd7a7qz4v8r5h7bpxc4ig5b-mariadb-10.5.9.drv.bz2'. guix build: error: build of `/gnu/store/hk1awalxmnd7a7qz4v8r5h7bpxc4ig5b-mariadb-10.5.9.drv' failed Léo Le Bouter (1): gnu: mariadb: Update to 10.5.9 [fixes CVE-2021-27928]. gnu/packages/databases.scm | 33 + 1 file changed, 33 insertions(+) -- 2.31.0

bug#47257: [PATCH 1/1] gnu: mariadb: Update to 10.5.9 [fixes CVE-2021-27928].

2021-03-19 Thread Léo Le Bouter via Bug reports for GNU Guix
* gnu/packages/databases.scm (mariadb/fixed): New variable. (mariadb)[replacement]: Graft. --- gnu/packages/databases.scm | 33 + 1 file changed, 33 insertions(+) diff --git a/gnu/packages/databases.scm b/gnu/packages/databases.scm index 8be83f5cbe..6fdb22d7fb

bug#47259: python-pillow-simd package vulnerable to at least CVE-2021-25293

2021-03-19 Thread Léo Le Bouter via Bug reports for GNU Guix
@7.1.2 Do we remove it? Do we want to commit to backporting/applying all fixes from python-pillow back in python-pillow-simd ourselves (I don't)? Léo signature.asc Description: This is a digitally signed message part

bug#47257: mariadb is vulnerable to CVE-2021-27928 (RCE)

2021-03-19 Thread Léo Le Bouter via Bug reports for GNU Guix
AIUI. I am not sure we could actually update individual outputs right now though. Might be a good idea to split the packages for the future. Léo signature.asc Description: This is a digitally signed message part

bug#47256: generic-html updater does not work for mediainfo package

2021-03-19 Thread Léo Le Bouter via Bug reports for GNU Guix
not help. The release area has a folder with version and then a tar.gz with version inside it's name as well, not sure if generic-html updater supports that. See: https://mediaarea.net/download/source/mediainfo/ Thank you! Léo signature.asc Description: This is a digitally signed message part

bug#47230: Build phase to graft during build for better grafts QA

2021-03-19 Thread Léo Le Bouter via Bug reports for GNU Guix
On Thu, 2021-03-18 at 21:41 +0100, Ludovic Courtès wrote: > I think it’s more of a discussion for guix-devel than a bug > report. :-) Yes but then I was thinking how do we track progress without losing it in the pile of emails from guix-devel people receive everyday which made me create a bug in

imagemagick@6.9.11-48 to graft or not to graft with 6.9.12-2

2021-03-19 Thread Léo Le Bouter
all commits and then it means we would have to apply patches for each and every CVE which can be tedious to create and maintain and to me leaving the package as-is without patching is not really OK :-/ To graft or not to graft? Thank you, Léo signature.asc Description: This is a digitally signed

bug#47228: Check binary consistency after grafting with e.g. ldd

2021-03-19 Thread Léo Le Bouter via Bug reports for GNU Guix
likely if we have to dig commit history manually). If nobody can put time to dig patches for all individuals CVEs until we ungraft then I'd rather have this scary commit in. Léo signature.asc Description: This is a digitally signed message part

bug#47154: ungoogled-chromium@88.0.4324.182 package vulnerable to various severe CVEs

2021-03-19 Thread Léo Le Bouter via Bug reports for GNU Guix
Fixed by 1155a88308df7649fe74bd5bb8279a4d103ce386 signature.asc Description: This is a digitally signed message part

bug#47229: Local privilege escalation via guix-daemon and ‘--keep-failed’

2021-03-18 Thread Léo Le Bouter via Bug reports for GNU Guix
Thanks a lot to the reporter and for working on this! signature.asc Description: This is a digitally signed message part

bug#47231: sqlite package is vulnerable to CVE-2020-11655, CVE-2020-11656, CVE-2020-13434, CVE-2020-13435, CVE-2020-13630, CVE-2020-13631, CVE-2020-13632, CVE-2020-15358 and CVE-2020-9327

2021-03-18 Thread Léo Le Bouter via Bug reports for GNU Guix
on improving that process. Attached WIP patch. Thank you! Léo From b0f9566e9ff9a5f409a3fd4293c048ec58bc770d Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?L=C3=A9o=20Le=20Bouter?= Date: Thu, 18 Mar 2021 07:09:10 +0100 Subject: [PATCH] gnu: sqlite: Update to 3.32.3 [security fixes]. * gnu/packages/sqlite.scm

bug#47230: Build phase to graft during build for better grafts QA

2021-03-18 Thread Léo Le Bouter via Bug reports for GNU Guix
) to run the test suite WITH the graft. This could be turned on by GNU Guix contributors after trying to graft some package to ensure it does not break things. What do you think? Léo signature.asc Description: This is a digitally signed message part

bug#47228: Check binary consistency after grafting with e.g. ldd

2021-03-18 Thread Léo Le Bouter via Bug reports for GNU Guix
(might actually run code from the binary) or objdump -x (pure static analysis), so after grafting we could check that every binary can load all it's dependents declared in the ELF headers successfully and report errors if not? What do you think? Léo signature.asc Description: This is a digitally

bug#47186: python2 variants made through (package-with-python2 (strip-python2-variant ...)) don't inherit grafts

2021-03-18 Thread Léo Le Bouter via Bug reports for GNU Guix
On Wed, 2021-03-17 at 04:05 -0400, Mark H Weaver wrote: > I've made an attempt to improve this situation in commit > 1a265842e634656411bc7304c4648273f174f65e on the 'master' branch. > Especially note the changes made in guix/build-system/python.scm. > > You might find that commit

bug#47227: Create git-tag refresh updater

2021-03-18 Thread Léo Le Bouter via Bug reports for GNU Guix
We could do it without cloning the repos, for example the "fennel" package: $ git ls-remote --tags https://git.sr.ht/~technomancy/fennel e54a85b3525a44ac16d6a4e35d19a1d5d6948ce2refs/tags/0.1.0 5c58b24f5261734caff25b9cbe2e8b551027a8bdrefs/tags/0.1.1

bug#47226: fennel package not working with generic-html refresh updater

2021-03-18 Thread Léo Le Bouter via Bug reports for GNU Guix
After applying: diff --git a/gnu/packages/lua.scm b/gnu/packages/lua.scm index edb3f85109..36fd1eb066 100644 --- a/gnu/packages/lua.scm +++ b/gnu/packages/lua.scm @@ -1175,6 +1175,8 @@ enabled.") (snippet '(begin (delete-file "fennelview.lua")

Re: Why [bug#47081] Remove mongodb?

2021-03-17 Thread Léo Le Bouter
On Wed, 2021-03-17 at 19:51 +0100, zimoun wrote: > It shows exactly my point. The correct and polite way of doing the > thing is first to examine the issue at hand (3.4.10 is old with > security > vulnerabilities), then propose a fix (e.g., the removal), wait > feedback, > and complete. Actually

bug#47218: glibc 2.33's HWCAPS and GCC Function Multiversioning for performance

2021-03-17 Thread Léo Le Bouter via Bug reports for GNU Guix
"-march=native" to CFLAGS (breaking reproducibility). Léo signature.asc Description: This is a digitally signed message part

Re: Why [bug#47081] Remove mongodb?

2021-03-17 Thread Léo Le Bouter
The issue with 3.4.24 / 3.4.10 is that Efraim reverted the commit then it was briefly discussed on IRC and Efraim thought I was right about the licensing being fine on 3.4.24 and reverted their revert commit, after some actual checking in the tarball grepping for license headers I found out I was

bug#47217: generic-html updater does not work with sqlite package

2021-03-17 Thread Léo Le Bouter via Bug reports for GNU Guix
I applied such patch: diff --git a/gnu/packages/sqlite.scm b/gnu/packages/sqlite.scm index eeb77749d8..35cf0168e0 100644 --- a/gnu/packages/sqlite.scm +++ b/gnu/packages/sqlite.scm @@ -65,6 +65,8 @@ (sha256 (base32

Re: Rust and parametric packages

2021-03-17 Thread Léo Le Bouter
On Wed, 2021-03-17 at 18:30 +0100, raingloom wrote: > I'm re-reading the threads about Rust packaging and I realized there > might be a solution to the build artifact reuse problem. > > As I understand it, the problem is that crates can be compiled with > any > number of features enabled or

Re: Why [bug#47081] Remove mongodb?

2021-03-17 Thread Léo Le Bouter
-revert the revert to restore 3.4.10 instead so we get rid of the non-free code issue. Does anyone actually use MongoDB on GNU Guix? Some people don't look at versions or when they were released and just trust GNU Guix. > > All the best, > simon Léo signature.asc Description: This is a digitally signed message part

Re: Fedora/Debian release monitoring inspiration for Guix Data Service

2021-03-17 Thread Léo Le Bouter
On Wed, 2021-03-17 at 18:35 +0100, Ludovic Courtès wrote: > Established distros have great tools and services for that. > > Guix has ‘guix refresh’, which predates some of the trendy > release/CVE > monitoring services and actually works well. It’s not perfect, but > it’s > good, so my advice

Re: Why [bug#47081] Remove mongodb?

2021-03-17 Thread Léo Le Bouter
Sorry for duplicated email, On Wed, 2021-03-17 at 17:56 +0100, zimoun wrote: > If the removal for security reasons had been discussed on IRC, it > could > be nice to point the discussion here. Otherwise, open a discussion > on > the topic on guix-devel or bug-guix. The full removal is a radical

Re: Why [bug#47081] Remove mongodb?

2021-03-17 Thread Léo Le Bouter
te was reverted, then the revert was reverted due to debate on licensing which turns out reverting the revert was actually wrong because some specific files were under SSPL, at that point we were shipping SSPL code which is nonfree, so the removal is also that. Nonfree code + security issue m

Re: Are gzip-compressed substitutes still used?

2021-03-17 Thread Léo Le Bouter
Just as a reminder siding with vagrantc here: We must ensure the Debian 'guix' package can still work and upgrade from it's installed version, so ensure that removing gzip doesnt break initial 'guix pull' with it. signature.asc Description: This is a digitally signed message part

Re: Fedora/Debian release monitoring inspiration for Guix Data Service

2021-03-17 Thread Léo Le Bouter
On Tue, 2021-03-16 at 23:28 +, Christopher Baines wrote: > I did spot these patches > https://patches.guix-patches.cbaines.net/project/guix-patches/list/?series=7298 Awesome!! I did not see them earlier! > I think the Guix Data Service could run the "refresh" code from Guix > and > store

Re: Release 1.2.1: zstd 1.4.4 -> 1.4.9: grafting or core-updates?

2021-03-17 Thread Léo Le Bouter
On Tue, 2021-03-16 at 21:53 +0100, Tobias Geerinckx-Rice wrote: > Hi L[ée]o, > > Wow, Léo. You've done some seriously impressive CVE squashing in > such a short timespan, and I'm very grateful to have you on board. I spent few days on this, it's not that much! I did not do much w

Re: Security-czar needed? WAS: Re: Release 1.2.1: zstd 1.4.4 -> 1.4.9: grafting or core-updates?

2021-03-17 Thread Léo Le Bouter
On Tue, 2021-03-16 at 22:46 +0100, Bengt Richter wrote: > I would feel better about running guix on my laptop if I > knew all you developers had gotten together and elected > a "security czar" who is the most competent of you to monitor > security and also cares the most, and had the power to

Re: [opinion] CVE-patching is not sufficient for package security patching

2021-03-17 Thread Léo Le Bouter
ration files that allow executing arbitrary code, also GNU Guile seems to have a sandboxed evaluation mode, that's good. I like the freedom of arbitrary code evaluation anywhere gives us, but I also want to make sure it's actually secure to do so. Léo signature.asc Description: This is a digi

Re: [opinion] CVE-patching is not sufficient for package security patching

2021-03-17 Thread Léo Le Bouter
quot;, "guix-ugly" or "guix-love-me-please". Léo signature.asc Description: This is a digitally signed message part

Re: Release 1.2.1: zstd 1.4.4 -> 1.4.9: grafting or core-updates?

2021-03-16 Thread Léo Le Bouter
On Tue, 2021-03-16 at 19:46 +0100, zimoun wrote: > Well, it seems better to send such changes to guix-patches, waiting > 15 > days, and then if no comment, push. It is what the manual describes: > > Non-trivial patches should always be posted to > guix-patc...@gnu.org (trivial

Re: Release 1.2.1: zstd 1.4.4 -> 1.4.9: grafting or core-updates?

2021-03-16 Thread Léo Le Bouter
env guix refresh -l zstd@1.4.4 Building the following 5115 packages would ensure 10443 dependent packages are rebuilt [...] There we are, almost all packages need to be rebuilt. Léo signature.asc Description: This is a digitally signed message part

Re: Release 1.2.1: zstd 1.4.4 -> 1.4.9: grafting or core-updates?

2021-03-16 Thread Léo Le Bouter
se types of > patches should be reviewed on guix-patches. Léo, can you send them to > guix-patches in the future? > > Sometimes it is okay to update things in a graft, but it depends on > the > situation. 1.4.4 and 1.4.9 are ABI compatible? At least that's the reason I b

Re: Release 1.2.1: zstd 1.4.4 -> 1.4.9: grafting or core-updates?

2021-03-16 Thread Léo Le Bouter
ause we lived with something that we should live with it longer, I don't want unpatched zstd (or any other) CVEs on my system. Actually I am not sure 1.4.4 had any CVE before that one though, so that must also be why. Léo signature.asc Description: This is a digitally signed message part

Re: Release 1.2.1: zstd 1.4.4 -> 1.4.9: grafting or core-updates?

2021-03-16 Thread Léo Le Bouter
I suggest we disable the test-suite or the specific test in the interim for other architectures. The CVE-2021-24032 is Base Score: 9.1 CRITICAL - which is exceptionally high so fixing it is an absolute necessity in any branch. signature.asc Description: This is a digitally signed message part

bug#47190: Building git fails because of a hash mismatch

2021-03-16 Thread Léo Le Bouter via Bug reports for GNU Guix
On Tue, 2021-03-16 at 13:57 +0100, Konrad Hinsen wrote: > With Guix commit (ab9629b7c91ff7d6392a03512cfe44282326), building > git fails because of a hash mismatch when downloading the man pages > (see > log below). > Yes, this is fixed by 0ee5d4f7a8e25be437297f88ed7013c4f37abafb, simply

Re: Fedora/Debian release monitoring inspiration for Guix Data Service

2021-03-16 Thread Léo Le Bouter
On Tue, 2021-03-16 at 12:12 +0100, Ricardo Wurmus wrote: > Léo Le Bouter writes: > > > I am thinking we should really get something like this with the > > Guix > > Data Service, start including something similar to Debian > > uscan/watch > > rules in

Re: [opinion] CVE-patching is not sufficient for package security patching

2021-03-16 Thread Léo Le Bouter
On Tue, 2021-03-16 at 12:17 +0100, Jonathan Brielmaier wrote: > I think the only two reasons against that are: time and > CI/rebuilding. I > think thats the reason why stuff like Gnome and others lower in the > dependency tree are lacking behind... Being non-FHS and non-systemd > makes updates for

[opinion] CVE-patching is not sufficient for package security patching

2021-03-16 Thread Léo Le Bouter
even when it requires us to do more far-reaching changes because of dependents/dependencies. Let me know what you think! Léo signature.asc Description: This is a digitally signed message part

Fedora/Debian release monitoring inspiration for Guix Data Service

2021-03-16 Thread Léo Le Bouter
tter.scm) and trying to build it and all it's dependents and if it doesnt cause any new failures we could send an automated patch contribution on guix-patches directly and tag it with "ci-update-ok" or something so a maintainer just has to double-check quickly and push (very efficien

bug#47188: "guix lint -c cve" does not account for language prefixes (rust-, python-, go-, ..)

2021-03-16 Thread Léo Le Bouter via Bug reports for GNU Guix
./pre-inst-env guix lint -c cve python-urllib3@1.26.2 Here this should return at least CVE-2021-28363 but it does not because the CVE database contains urllib3 and not python-urllib3 (which AFAICT the cve linter searches for). Annotating each and every python-, go-, and rust- package with

bug#47185: grub2 package is vulnerable to CVE-2020-14372, CVE-2020-25632, CVE-2020-25647, CVE-2020-27749, CVE-2020-27779, CVE-2021-20225, CVE-2021-20233 and CVE-2021-3418

2021-03-16 Thread Léo Le Bouter via Bug reports for GNU Guix
NOTE: SecureBoot on GNU Guix is not something common at all, so the urgency to fix this issue is not as great as if we explicitly advertised support for SecureBoot. signature.asc Description: This is a digitally signed message part

bug#47186: python2 variants made through (package-with-python2 (strip-python2-variant ...)) don't inherit grafts

2021-03-16 Thread Léo Le Bouter via Bug reports for GNU Guix
As outlined by: - https://git.savannah.gnu.org/cgit/guix.git/commit/?id=a01bfa7deed1d556fc75ab5588517442054bc5a9 - https://git.savannah.gnu.org/cgit/guix.git/commit/?id=db87d6ddafd26c5ad657178cf7fdab524d05c522 Two commits needed to be made to fix the issue both in the python2 and python3

bug#47185: grub2 package is vulnerable to CVE-2020-14372, CVE-2020-25632, CVE-2020-25647, CVE-2020-27749, CVE-2020-27779, CVE-2021-20225, CVE-2021-20233 and CVE-2021-3418

2021-03-16 Thread Léo Le Bouter via Bug reports for GNU Guix
On Tue, 2021-03-16 at 09:08 +0100, Léo Le Bouter via Bug reports for GNU Guix wrote: > There is no new upstream release so patching this appears to be some > kind of sport. There seems to be a release candidate available: https://lists.gnu.org/archive/html/grub-devel/2021-03/msg0021

Re: Let's include powerpc64le-linux in the next release (was: Re: Release on April 18th?)

2021-03-16 Thread Léo Le Bouter
On Tue, 2021-03-16 at 09:08 +0200, Efraim Flashner wrote: > On Mon, Mar 15, 2021 at 09:03:04PM -0700, Chris Marusich wrote: > > How shall we build the binary tarball for the release? Of course, > > anybody with a copy of the (source) release tarball can build their > > own > > guix binary by

bug#47185: grub2 package is vulnerable to CVE-2020-14372, CVE-2020-25632, CVE-2020-25647, CVE-2020-27749, CVE-2020-27779, CVE-2021-20225, CVE-2021-20233 and CVE-2021-3418

2021-03-16 Thread Léo Le Bouter via Bug reports for GNU Guix
As outlined by https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass2021 we have a new wave of GRUB security vulnerabilities around SecureBoot. There is no new upstream release so patching this appears to be some kind of sport. Debian has patched it in this commit:

bug#47172: GNU Shepherd 0.8.1 fails on core-updates

2021-03-15 Thread Léo Le Bouter via Bug reports for GNU Guix
Some tests fail: FAIL: tests/no-home.sh FAIL: tests/status-sexp.sh PASS: tests/misbehaved-client.sh FAIL: tests/replacement.sh PASS: tests/file-creation-mask.sh PASS: tests/restart.sh PASS: tests/one-shot.sh FAIL: tests/basic.sh PASS: tests/respawn-throttling.sh PASS: tests/signals.sh PASS:

bug#47144: [PATCH 0/1] gnu: patch: Update to 2.7.6-7623b2d [security fixes].

2021-03-15 Thread Léo Le Bouter via Bug reports for GNU Guix
: error: parse-datetime.c: No such file or directory gcc: fatal error: no input files compilation terminated. This file seems to be generated by YACC from earlier log. Léo Le Bouter (1): gnu: patch: Update to 2.7.6-7623b2d [security fixes]. gnu/packages/base.scm | 39

bug#47144: [PATCH 1/1] gnu: patch: Update to 2.7.6-7623b2d [security fixes].

2021-03-15 Thread Léo Le Bouter via Bug reports for GNU Guix
* gnu/packages/base.scm (patch/fixed): New variable. (patch)[replacement]: Graft. --- gnu/packages/base.scm | 39 +++ 1 file changed, 39 insertions(+) diff --git a/gnu/packages/base.scm b/gnu/packages/base.scm index 9aa69cfe77..a71b47ac4f 100644 ---

Re: GNU Mes 0.23 released

2021-03-15 Thread Léo Le Bouter via rb-general
Thanks a lot! Keep it up! :-D signature.asc Description: This is a digitally signed message part

Re: GNU Mes 0.23 released

2021-03-15 Thread Léo Le Bouter
Thanks a lot! Keep it up! :-D signature.asc Description: This is a digitally signed message part

Re: Guile Netlink 1.0 released

2021-03-15 Thread Léo Le Bouter
Exciting new possibilities! Great work! signature.asc Description: This is a digitally signed message part

bug#47154: ungoogled-chromium@88.0.4324.182 package vulnerable to various severe CVEs

2021-03-15 Thread Léo Le Bouter via Bug reports for GNU Guix
Hello! Latest version is 89.0.4389.90 ungoogled-chromium upstream has it: https://github.com/Eloston/ungoogled-chromium/commit/64cbcbcfee33fd56760173b3a17d2de52cd77258 Debian also upgraded: https://salsa.debian.org/chromium-team/chromium/-/commit/8a1f530bdc3fc90993cdc1499e77f9e91468a686 I am

Re: gnutls package may be vulnerable to CVE-2021-20232

2021-03-13 Thread Léo Le Bouter
don't forget things and can come back later, and if I disappear, other people can still have a go at them. Léo signature.asc Description: This is a digitally signed message part

gnutls package may be vulnerable to CVE-2021-20232

2021-03-12 Thread Léo Le Bouter
CVE-2021-20232 12.03.21 20:15 A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences. It is not certain whether 3.6.x series are affected as packaged in GNU Guix. I asked the upstream at

libupnp package vulnerable to CVE-2021-28302

2021-03-12 Thread Léo Le Bouter
CVE-2021-28302 12.03.21 16:15 A stack overflow in pupnp 1.16.1 can cause the denial of service through the Parser_parseDocument() function. ixmlNode_free() will release a child node recursively, which will consume stack space and lead to a crash. Upstream did not provide a patch yet, see <

Re: glib vulnerable to CVE-2021-28153

2021-03-11 Thread Léo Le Bouter
On Fri, 2021-03-12 at 01:47 -0500, Mark H Weaver wrote: > Thanks. I backported the upstream fix, and pushed it to 'master' in > commit 5a06b83fc92710c5846a83bbf49f0ea84c8ecec2. > > Mark Many thanks to you!! signature.asc Description: This is a digitally signed message part

glib vulnerable to CVE-2021-28153

2021-03-11 Thread Léo Le Bouter
again it seems? Thank you, Léo signature.asc Description: This is a digitally signed message part

Re: glib@2.62.6 is vulnerable to CVE-2021-27218 and CVE-2021-27219

2021-03-11 Thread Léo Le Bouter
On Thu, 2021-03-11 at 06:23 -0500, Mark H Weaver wrote: > Mark H Weaver writes: > > > As I wrote in another thread: I'll backport the fixes for CVE-2021- > > 27218 > > and CVE-2021-27219 to our version of Glib, based on the backports > > already published by Ubuntu for Glib 2.56.4 and 2.64.4. >

Re: GNU Guix (pull?) on i686 broke after zstd grafting

2021-03-11 Thread Léo Le Bouter
On Thu, 2021-03-11 at 10:58 +0100, zimoun wrote: > Well, IMHO 1) «not durable» could mean months and 2) disabling all > the > tests for all the architectures is wrong especially when only one > test > is failing for only one architecture. I know that, I was tired yesterday and didnt want to block

Re: GNU Guix (pull?) on i686 broke after zstd grafting

2021-03-11 Thread Léo Le Bouter
On Thu, 2021-03-11 at 10:37 +0100, zimoun wrote: > This disable the complete test suite for all the architecture. I > have > not look into the details but it seems better to only disable the > offending test only the architecture affected. Yes it does that and it would be better not to but zstd

Re: I've rebased wip-ppc64le onto core-updates

2021-03-11 Thread Léo Le Bouter
Just wanted to say, Chris, thank you so much for following up steadily on this powerpc64le-linux work. I have been testing your changes on and off but without getting to actually solving issues as I have been busy with other things unrelated with GNU Guix and also GNU Guix CVE patching now.

Re: GNOME 3.34 in GNU Guix and security

2021-03-11 Thread Léo Le Bouter
On Thu, 2021-03-11 at 03:18 -0500, Mark H Weaver wrote: > Hi Léo, Hello! > I appreciate your recent work on Guix security. Thank you for that. Very happy to catch up there as well for my own usage of GNU Guix as well! > Can you please substantiate this? What vulnerabilities do

2443 packages indirectly depend on unsupported openssl@1.0.2u

2021-03-10 Thread Léo Le Bouter
security fixes for that version is available. What can we do about this you think? Léo signature.asc Description: This is a digitally signed message part

GNOME 3.34 in GNU Guix and security

2021-03-10 Thread Léo Le Bouter
afford to spend time backporting security fixes to the numerous GNOME packages with CVEs, not with current resources, it is time-consuming. Léo signature.asc Description: This is a digitally signed message part

pjproject package is vulnerable to CVE-2021-21375 and CVE-2020-15260

2021-03-10 Thread Léo Le Bouter
CVE-2021-21375 00:15 PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP version 2.10 and earlier, after an initial INVITE has been sent, when two 183 responses are

Re: GNU Guix (pull?) on i686 broke after zstd grafting

2021-03-10 Thread Léo Le Bouter
the graft. At least this fixes the issue, if anyone wants to still enable tests, feel free, no energy for that myself now. This will do while we wait for an upstream patch. Léo signature.asc Description: This is a digitally signed message part

GNOME Orca 'orca' package mislabeled by 'guix lint -c cve'

2021-03-10 Thread Léo Le Bouter
This is GNOME Orca in the CPE database: https://nvd.nist.gov/products/cpe/detail/660937?namingFormat=2.3=CPEURI=orca=FINAL Currently CVE-2020-9298 is being wrongly reported by 'guix lint -c cve' because vendor is not taken into account, therefore: "cpe:2.3:a:spinnaker:orca" also matches.

glib@2.62.6 is vulnerable to CVE-2021-27218 and CVE-2021-27219

2021-03-10 Thread Léo Le Bouter
/-/merge_requests/1942 (CVE-2021- 27218) - https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1944 (CVE-2021- 27218) - https://gitlab.gnome.org/GNOME/glib/-/issues/2319 (CVE-2021-27219) Léo signature.asc Description: This is a digitally signed message part

Re: Mixed Languages Programming

2021-03-10 Thread Léo Le Bouter
operability, mixing packages, etc?  I don't think so, not in particular. > Cheers, > Yasu Léo signature.asc Description: This is a digitally signed message part

Re: bsdiff package vulnerable to CVE-2020-14315

2021-03-10 Thread Léo Le Bouter
On Wed, 2021-03-10 at 12:32 -0500, Leo Famulari wrote: > Well, we could also just remove this package. It sounds like it is > not > supported on Linux. Does it offer some unique functionality? I would advocate for removal of the package, or at least warning about absence of security patches for

Re: GNU Guix (pull?) on i686 broke after zstd grafting

2021-03-10 Thread Léo Le Bouter
On Wed, 2021-03-10 at 11:37 +0100, Ludovic Courtès wrote: > Hi Léo, Hi Ludo! > So I think there’s a genuine bug here. Could you take a look? At > worst, we should skip the offending test on i686 (and perhaps > ARMv7?). I reported upstream and I got an answer, waiting for fix but a

<    1   2   3   4   5   6   7   8   9   10   >