On Tue, 8 Jul 2025 21:01:58 +0200
Denis 'GNUtoo' Carikli <gnu...@cyberdimension.org> wrote:

> Given the current status I gave a quick and dirty try at "backporting"
> the patches and so far I have something that compiles and I will try
> to test it soon[4]

I had to install slirp4netns and recompile Guix from scratch, but then
my quick and dirty "backport" seems to work:
> substitute: updating substitutes from
> 'https://bordeaux.guix.gnu.org'... 100.0% substitute: updating
> substitutes from 'https://ci.guix.gnu.org'... 100.0% building path(s)
> `/gnu/store/q7zx2204nxc1m8vdq0w4p05y4bp8jra2-check-abstract-socket-hole'
> killing process 1754127 Abstract Unix-domain socket hole is CLOSED,
> build failed with "while setting up the child process: in phase
> waitForSlirpReady: unexpected end-of-file".

Now I guess the next step could be to try to reduce the amount of
patches and test the previous security vulnerabilities as well. I've
code to do that automatically[1], but here too there is room for
improvements as this code that comes from the blog posts about security
issues probably needs to be integrated in Guix proper somehow.

References:
-----------
[1]https://git.sr.ht/~gnutoo/guix-security-tests

Denis.

Attachment: pgpstmsB4KE81.pgp
Description: OpenPGP digital signature

Reply via email to