The guix-security mailing list is meant to be a private messaging system for 
embargoed (i.e. secret) security reports. Everything else should be handled in 
public.

Leo

On Fri, Apr 4, 2025, at 12:21, John Kehayias wrote:
> Hello,
>
> (CCing some more security people)
>
> On Fri, Apr 04, 2025 at 05:51 PM, Simon Josefsson via \"Development of 
> GNU Guix and the GNU System distribution.\" wrote:
>
>> Nicolas Graves <ngra...@ngraves.fr> writes:
>>
>>> Hi Guix!
>>>
>>> I think one of the things where Guix could be better is security /
>>> ensuring CVEs are fixed quickly.
>>>
>>> In 76819 I developped some missing functionality in the CVE linter, so
>>> that it will be easier to get proper missing libraries.
>>>
>>> A few ideas/questions to advance on that :
>>> - there are still a lot of linted CVEs for toolchains (former go
>>>   versions etc) that users should in principle not be exposed to.
>>>   Should we handle or ignore those?
>
> I think we should definitely handle all CVEs, as best we can. Toolchain
> updates will be slower unfortunately, but we have grafts we can do of
> course (already too many).
>
>>> - Maybe having a team or a responsible person for this is a good
>>> idea.
>
> Do you mean for package-level CVEs and the like? We do have a
> security-team: <https://guix.gnu.org/en/security/> (linked from the
> About menu on the Guix homepage).
>
> Admittedly, we could use more people and rotate out, with some set terms.
> It has been mentioned before but not done. I'm on the team and we could
> do better. Some things take a while (though I think we have been pretty
> good about Guix-specific issues in the recent past), though generally it
> is quite low traffic. Prioritizing package updates to do CVEs can and
> should be done by us all though.
>
>>> - A good practice could be to setup a daily job to get notified of all
>>>   CVEs, so that we can quickly handle them.
>>
>
> That does sound helpful, though also running `guix lint` on any
> submission or review of a patch should catch CVEs as well. A set
> job/notification sounds helpful.
>
> Perhaps you also meant a public security list for things like speedier
> review of patches with "security-updates" or CVEs listed? I'm not sure
> if we want that together or not with a private list for undisclosed
> vulnerabilities, but for sure a way to ping some extra people for such
> (public) security updates would be great. Presumably we can leverage
> what is done for CCing teams to look for those keywords and CC security?
> I try to keep an eye open when I can but that is no substitute.
>
>> Yes, most distributions have a special security point of contact that is
>> not publicly archived, to discuss ways to resolve responsible disclosure
>> vulnerabilities for example.  Seeing some progress on this has been one
>> blocker for me to increase dependence on Guix for production systems.
>> The process doesn't have to work perfect (I don't think anyone would
>> suggest Debian/Fedora/Ubuntu/RHEL/etc handle security bugs perfect
>> either), but one important step is for the process to exist.
>>
>> /Simon
>
> Simon, do you mean there has or has not been progress? As I noted above,
> we do have a private security list for such things though the vast
> majority of CVEs tend to be for older packages we have that need to be
> updated. Issues specific to Guix do get emailed out and posted on the
> website when they are fixed/disclosed.
>
> Oh, while I'm here: we need to ungraft! I would like some sort of
> cadence for this, perhaps:
>
> 1. Any graft immediately has an ungraft patch applied to, say,
> "ungrafting-branch" or some branch focused on that.
>
> 2. This is built and merged every month (?) or once a certain number of
> ungrafts/package rebuilds are needed (insert favorite arbitrary number),
> whichever comes first.
>
> Maybe this needs a proper GCD? I think we could just try something as
> this is more basic build management than a change to the project,
> because right now we keep falling behind and easily spend more time
> grafting than building on user systems.
>
> John

Reply via email to