Conversation
|
(I fixed the spelling of |
There was a problem hiding this comment.
I'd like to see it include upstream's ain't gonna apply to a libtiff from 2012patches if possible. Even though we don't have any security patches in there right now, when they get added I'd like to be sure we're not leaving this variant unpatched.
There was a problem hiding this comment.
Further to that, have we looked at what vulnerabilities libtiff 4.0.3 is open to?
There was a problem hiding this comment.
Basically almost everything after approx CVE-2012-4447 in http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=libtiff
Which is approx 30?
There was a problem hiding this comment.
Yup. vulnix $(nix-build . -A opentoonz-libtiff) counts 35. An NVD search counts 50. I opened https://github.com/opentoonz/opentoonz/issues/4193 about it.
There was a problem hiding this comment.
It's "fine" as long as we add a knownVulnerabilities listing them, or perhaps rather than a definitive list, general advice "don't open untrusted files with opentoonz.
There was a problem hiding this comment.
Thanks! I added a knownVulnerabilities.
pkgs/top-level/all-packages.nix
Outdated
There was a problem hiding this comment.
| opentoonz = qt5.callPackage ../applications/graphics/opentoonz { | |
| opentoonz = let | |
| opentoonz-libtiff = callPackage ../applications/graphics/opentoonz/libtiff.nix { }; | |
| in qt5.callPackage ../applications/graphics/opentoonz { |
There was a problem hiding this comment.
I'd really suggest not exposing this overridden version in the main package set unless there's an explicit reason to do so.
(The qtbase diamond-dependency problem was resolved in 4bac8a7)
|
Successfully created backport PR #153627 for |
Motivation for this change
Fix opentoonz build.
Fixes #132964.
Addresses #151469 for opentoonz (I verified that opentoonz works in
staging-nextafter this version bump).Things done
sandbox = trueset innix.conf? (See Nix manual)nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage./result/bin/)nixos/doc/manual/md-to-db.shto update generated release notes