GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    sjvn (sjvn@mastodon.social)'s status on Wednesday, 12-Nov-2025 04:12:25 JST sjvn sjvn
    • sjvn

    FFmpeg to Google Fund Us or Stop Sending Bugs: https://thenewstack.io/ffmpeg-to-google-fund-us-or-stop-sending-bugs/ by @sjvn

    The clash between small volunteer-driven, open-source projects, such as FFmpeg & the billion-dollar companies built on their work, which demand rapid security patches, is heating up.

    In conversation about a month ago from mastodon.social permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: cdn.thenewstack.io
      FFmpeg to Google: Fund Us or Stop Sending Bugs
      from Steven J. Vaughan-Nichols
      A lively discussion about open source, security, and who pays the bills has erupted on Twitter. 
    • Embed this notice
      Wolf480pl (wolf480pl@mstdn.io)'s status on Wednesday, 12-Nov-2025 04:12:25 JST Wolf480pl Wolf480pl
      in reply to

      @sjvn I think it's unclear what's preventing ffmpeg devs from just ignoring these bug reports.

      Like, if GPZ were to publish the details of an unfixed vuln in a rarely-used feature of ffmpeg, there shouldn't be much impact on real users, most of the pain would be with the CVE-obsessed corpos that use ffmpeg in their products, right?

      In conversation about a month ago permalink
      Haelwenn /элвэн/ :triskell: likes this.
    • Embed this notice
      Haelwenn /элвэн/ :triskell: (lanodan@queer.hacktivis.me)'s status on Wednesday, 12-Nov-2025 04:15:39 JST Haelwenn /элвэн/ :triskell: Haelwenn /элвэн/ :triskell:
      in reply to
      • Wolf480pl
      @wolf480pl @sjvn I'd guess there's a lot of CVE-obsessed corpos, so it amplifies the spam about useless CVEs.
      After all there's often the box ticking thing of "Zero known CVEs with this version number", which is bullshit but that's corporate for you.
      In conversation about a month ago permalink
    • Embed this notice
      Wolf480pl (wolf480pl@mstdn.io)'s status on Wednesday, 12-Nov-2025 04:21:42 JST Wolf480pl Wolf480pl
      in reply to
      • Haelwenn /элвэн/ :triskell:

      @lanodan @sjvn
      Right, so they'd have to survive a wave of corpos asking about the CVE and tell all of them to send a patch or gtfo....

      Maybe they could create an issue on their issue tracker with the details of the vuln, and info why it's not a priority and that they lack resources to fix it.

      Then send all the angry corpos a link to that issue, and disable notifications.

      In conversation about a month ago permalink
      Haelwenn /элвэн/ :triskell: likes this.
    • Embed this notice
      Haelwenn /элвэн/ :triskell: (lanodan@queer.hacktivis.me)'s status on Wednesday, 12-Nov-2025 04:26:49 JST Haelwenn /элвэн/ :triskell: Haelwenn /элвэн/ :triskell:
      in reply to
      • Wolf480pl
      @wolf480pl @sjvn Well, it means they have to read and understand what's in the CVE, which can sometimes be hard but that's also why support companies (RedHat, Freexian, …) exists.
      In conversation about a month ago permalink
    • Embed this notice
      Wolf480pl (wolf480pl@mstdn.io)'s status on Wednesday, 12-Nov-2025 04:26:50 JST Wolf480pl Wolf480pl
      in reply to
      • Haelwenn /элвэн/ :triskell:

      @lanodan @sjvn
      Oh, also I don't blame corpos for having a "zero unfixed CVEs" policy for the simple reason that CVE metadata is not sufficient to effectively filter out things that don't affect you.

      In conversation about a month ago permalink
    • Embed this notice
      Wolf480pl (wolf480pl@mstdn.io)'s status on Wednesday, 12-Nov-2025 04:26:51 JST Wolf480pl Wolf480pl
      in reply to
      • Haelwenn /элвэн/ :triskell:

      @lanodan @sjvn
      I see three possible outcomes:
      - the corpos eventually make a patch
      - the corpos fork ffmpeg
      - the corpos remove ffmpeg from all of their products

      I don't think any of those would be tragic, though getting there might be painful :/

      In conversation about a month ago permalink
    • Embed this notice
      Phantasm (phnt@fluffytail.org)'s status on Wednesday, 12-Nov-2025 04:28:55 JST Phantasm Phantasm
      in reply to
      • Haelwenn /элвэн/ :triskell:
      • Wolf480pl
      @lanodan @sjvn @wolf480pl I've worked in _one_ of these "zero CVEs in production" companies. These decisions are usually made by managers that F5 Bleeping Computer all day and eat infosec snakeoil for breakfast. Usually accompanied by some completely dumb vuln scanner that only checks versions. Would not recommend anybody.
      In conversation about a month ago permalink
      Haelwenn /элвэн/ :triskell: likes this.
    • Embed this notice
      Phantasm (phnt@fluffytail.org)'s status on Wednesday, 12-Nov-2025 04:31:03 JST Phantasm Phantasm
      in reply to
      • Haelwenn /элвэн/ :triskell:
      • Wolf480pl
      @wolf480pl @lanodan @sjvn The way expat deals with this is that when GPZ or someone else sends them a vulnerability and the maintainer doesn't have time for it, he asks companies he knows use expat for help if they want to fix it with him.

      Which I think is a reasonable solution. Usually if a company knows that they would be affected, they'll be happy to help you in some way. The problem is that it requires already existing contacts in those companies.
      In conversation about a month ago permalink
      Haelwenn /элвэн/ :triskell: likes this.
    • Embed this notice
      Wolf480pl (wolf480pl@mstdn.io)'s status on Wednesday, 12-Nov-2025 04:31:23 JST Wolf480pl Wolf480pl
      in reply to
      • Haelwenn /элвэн/ :triskell:

      @lanodan @sjvn
      is there one for pypi?

      In conversation about a month ago permalink
    • Embed this notice
      Haelwenn /элвэн/ :triskell: (lanodan@queer.hacktivis.me)'s status on Wednesday, 12-Nov-2025 04:31:23 JST Haelwenn /элвэн/ :triskell: Haelwenn /элвэн/ :triskell:
      in reply to
      • Wolf480pl
      @wolf480pl @sjvn Pypi specifically is kind of weird (you'd want to cover the whole stack) but there probably is, I barely do Python.
      In conversation about a month ago permalink
    • Embed this notice
      Haelwenn /элвэн/ :triskell: (lanodan@queer.hacktivis.me)'s status on Wednesday, 12-Nov-2025 04:35:31 JST Haelwenn /элвэн/ :triskell: Haelwenn /элвэн/ :triskell:
      in reply to
      • Wolf480pl
      • Phantasm
      @phnt @sjvn @wolf480pl For expat I guess it's fine, there's isn't a ton of stuff in there so you could probably have a map of feature to corporation (same for like libxml2 and libxslt).

      But software like ffmpeg has a lot of niche stuff, and it doesn't have a separation of those like say gstreamer has.
      In conversation about a month ago permalink
    • Embed this notice
      Wolf480pl (wolf480pl@mstdn.io)'s status on Wednesday, 12-Nov-2025 04:38:11 JST Wolf480pl Wolf480pl
      in reply to
      • Haelwenn /элвэн/ :triskell:

      @lanodan @sjvn
      ok but like

      Assume I haven OS that has unattended security updates.

      And I run a web backend written in python on that host.

      And it has requirements.txt

      And I create a virtualenv and venv/bin/pip install -r requirements.txt before running my backend.

      And I want someone to go through requirements.txt, and find all libs that have vulns, and go through my code, see how I use those libs, and tell me which I need to update.

      In conversation about a month ago permalink
    • Embed this notice
      Haelwenn /элвэн/ :triskell: (lanodan@queer.hacktivis.me)'s status on Wednesday, 12-Nov-2025 04:38:11 JST Haelwenn /элвэн/ :triskell: Haelwenn /элвэн/ :triskell:
      in reply to
      • Wolf480pl
      @wolf480pl @sjvn Except quite a lot of python projects (even more common since Rust rewrite) have code and dependencies which aren't just purely Python.

      Python isn't an OS, it's just one language in a big stack.
      In conversation about a month ago permalink
    • Embed this notice
      Wolf480pl (wolf480pl@mstdn.io)'s status on Wednesday, 12-Nov-2025 04:44:37 JST Wolf480pl Wolf480pl
      in reply to
      • Haelwenn /элвэн/ :triskell:

      @lanodan @sjvn
      right, but those are usually compiled by pip still?

      Like you install build-essentials on the host OS, and then pip will take care of compiling all the rust code?

      In conversation about a month ago permalink
    • Embed this notice
      Haelwenn /элвэн/ :triskell: (lanodan@queer.hacktivis.me)'s status on Wednesday, 12-Nov-2025 04:44:37 JST Haelwenn /элвэн/ :triskell: Haelwenn /элвэн/ :triskell:
      in reply to
      • Wolf480pl
      @wolf480pl @sjvn build-essentials is for C code, while Rust is pretty much exclusively through cargo and not part of the distro libraries.
      In conversation about a month ago permalink
    • Embed this notice
      Phantasm (phnt@fluffytail.org)'s status on Wednesday, 12-Nov-2025 04:46:41 JST Phantasm Phantasm
      in reply to
      • Haelwenn /элвэн/ :triskell:
      • Wolf480pl
      @wolf480pl @sjvn @lanodan The "proper" way to use CVEs is just a label for a specific vulnerability. That's all. Then you need to asses them in some way if you are even affected by the vulnerability, and if yes how much and how to deal with it. A scanner can help you with that, but the problem with those, is that sometimes a vulnerability can be triggered only in some configuration and some of them don't deal with these CVEs ideally. They should essentially be only used for triage.

      A perfect example of how not to ever use CVEs is the Linux kernel. On one hand, the vast majority of them are actual, very small, vulnerabilities, but flooding the list with hundreds of them makes things only worse, which is the point. CVEs are kinda broken, but this is not the way to show how broken they are. And going through a list of 50 CVEs in a single release and figuring out if you should even care is not fun. Thankfully Red Hat for example filters the mostly non-problematic ones out and doesn't even list them. If that is a good approach is also debatable.

      >Also, have you ever worked at a company that cared about security fixes but had a more reasonable approach to it?
      Most of them are like that and my current employer is also like that. I would say that there are a lot more that simply don't care than those that care too much (doesn't help that IT departments are usually under-staffed). The "zero CVEs in production" companies are kinda rare, but they do exist.
      In conversation about a month ago permalink
      Haelwenn /элвэн/ :triskell: likes this.
    • Embed this notice
      Wolf480pl (wolf480pl@mstdn.io)'s status on Wednesday, 12-Nov-2025 04:46:42 JST Wolf480pl Wolf480pl
      in reply to
      • Haelwenn /элвэн/ :triskell:
      • Phantasm

      @phnt @sjvn @lanodan

      I suspect that might be the only way to use CVEs at all.

      Also, have you ever worked at a company that cared about security fixes but had a more reasonable approach to it?

      In conversation about a month ago permalink
    • Embed this notice
      Phantasm (phnt@fluffytail.org)'s status on Wednesday, 12-Nov-2025 04:46:56 JST Phantasm Phantasm
      in reply to
      • Haelwenn /элвэн/ :triskell:
      • Wolf480pl
      @wolf480pl @lanodan @sjvn
      >Like you install build-essentials on the host OS, and then pip will take care of compiling all the rust code?
      There's a fun catch with that. 99% of the time you just download a "wheel" from PyPi, which is pre-compiled blob with everything and building the stuff yourself is usually non-trivial if even possible.
      In conversation about a month ago permalink
      Haelwenn /элвэн/ :triskell: likes this.
    • Embed this notice
      Haelwenn /элвэн/ :triskell: (lanodan@queer.hacktivis.me)'s status on Wednesday, 12-Nov-2025 04:51:04 JST Haelwenn /элвэн/ :triskell: Haelwenn /элвэн/ :triskell:
      in reply to
      • Wolf480pl
      • Phantasm

      @phnt @sjvn @wolf480pl At least that comes from PyPI, there's also some horrors which downloads blobs in the setup.py or during runtime.

      In conversation about a month ago permalink

      Attachments


    • Embed this notice
      Haelwenn /элвэн/ :triskell: (lanodan@queer.hacktivis.me)'s status on Wednesday, 12-Nov-2025 04:52:00 JST Haelwenn /элвэн/ :triskell: Haelwenn /элвэн/ :triskell:
      in reply to
      • Wolf480pl
      • Phantasm
      @wolf480pl @phnt @sjvn Nope, working as intended, PyPI doesn't builds software, the devs pushing the releases do.

      (And that's one of the many reasons why I do not ever use pip)
      In conversation about a month ago permalink
    • Embed this notice
      Wolf480pl (wolf480pl@mstdn.io)'s status on Wednesday, 12-Nov-2025 04:52:01 JST Wolf480pl Wolf480pl
      in reply to
      • Haelwenn /элвэн/ :triskell:
      • Phantasm

      @phnt
      that sounds like one of the invariants of pypi has been broken/abandoned...

      @sjvn @lanodan

      In conversation about a month ago permalink
    • Embed this notice
      Phantasm (phnt@fluffytail.org)'s status on Wednesday, 12-Nov-2025 04:54:18 JST Phantasm Phantasm
      in reply to
      • Haelwenn /элвэн/ :triskell:
      • Wolf480pl
      @lanodan @sjvn @wolf480pl The worst I've seen so far is linux-wallpaperengine downloading pre-compiled chromium cef with CMake. Or maybe Bazel downloading some random Python version into the build tree, because it's a dependency while Python is already installed on the system.

      First is somewhat excusable, second absolutely is not.
      In conversation about a month ago permalink
      Haelwenn /элвэн/ :triskell: likes this.
    • Embed this notice
      Haelwenn /элвэн/ :triskell: (lanodan@queer.hacktivis.me)'s status on Wednesday, 12-Nov-2025 04:55:58 JST Haelwenn /элвэн/ :triskell: Haelwenn /элвэн/ :triskell:
      in reply to
      • Wolf480pl
      • Phantasm
      @phnt @sjvn @wolf480pl Heh, reminds me that Firefox quite some years ago used to ship a copy of a slightly outdated Python 2.x, and if you'd remove the executables the build would fail.

      https://hacktivis.me/notes/bootstrapping#firefox_python2
      In conversation about a month ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: hacktivis.me
        Bootstrapping — lanodan’s cyber-home
    • Embed this notice
      Haelwenn /элвэн/ :triskell: (lanodan@queer.hacktivis.me)'s status on Wednesday, 12-Nov-2025 05:04:44 JST Haelwenn /элвэн/ :triskell: Haelwenn /элвэн/ :triskell:
      in reply to
      • Wolf480pl
      • Phantasm

      @wolf480pl @phnt @sjvn Nah, requirements.txt is way too loose as it's just for dependency requirements, and which blobs will be downloaded is by definition system-dependent.

      You'd want either a lockfile (hell to maintain, pretty much nobody really uses them for security purposes, after all you'd need to audit binaries if you'd do) or a curated repository like a distro.

      In conversation about a month ago permalink
    • Embed this notice
      Wolf480pl (wolf480pl@mstdn.io)'s status on Wednesday, 12-Nov-2025 05:04:45 JST Wolf480pl Wolf480pl
      in reply to
      • Haelwenn /элвэн/ :triskell:
      • Phantasm

      @lanodan @phnt @sjvn

      In conversation about a month ago permalink

      Attachments


      1. https://media.mstdn.io/mstdn-media/media_attachments/files/115/532/805/436/906/925/original/64a755f371b6793f.jpg
    • Embed this notice
      Wolf480pl (wolf480pl@mstdn.io)'s status on Wednesday, 12-Nov-2025 05:04:45 JST Wolf480pl Wolf480pl
      in reply to
      • Haelwenn /элвэн/ :triskell:
      • Phantasm

      @lanodan @phnt @sjvn
      in any case:

      which binary wheels get installed, and which blobs get downloaded, is still determined by requirements.txt, right?

      So someone could recursively explore all of that pile?

      In conversation about a month ago permalink
    • Embed this notice
      Wolf480pl (wolf480pl@mstdn.io)'s status on Wednesday, 12-Nov-2025 05:20:04 JST Wolf480pl Wolf480pl
      in reply to
      • Haelwenn /элвэн/ :triskell:

      @lanodan
      btw. I read the rest of that blogpost, kinda couldn't believe the Java situation, so I looked it up and found this:

      https://www.chainguard.dev/unchained/fully-bootstrapping-java-from-source-in-wolfi

      and it indeed looks like a herculean effort

      In conversation about a month ago permalink
      Haelwenn /элвэн/ :triskell: likes this.
    • Embed this notice
      Haelwenn /элвэн/ :triskell: (lanodan@queer.hacktivis.me)'s status on Wednesday, 12-Nov-2025 05:23:29 JST Haelwenn /элвэн/ :triskell: Haelwenn /элвэн/ :triskell:
      in reply to
      • Wolf480pl
      @wolf480pl Yeah, at least it's one that we know works.
      For other languages… it's basically impossible until someone builds something like an interpreter/compiler that allows to build a decently recent version, and then keeps it maintained.

      Like we're very lucky that ecj exists for java, that mrustc exists for bootstrapping rustc, somewhat lucky for dotGNU for mono (somewhat because it's been long abandoned), …
      In conversation about a month ago permalink
    • Embed this notice
      J. R. DePriest :verified_trans: :donor: :Moopsy: :EA DATA. SF: (jrdepriest@infosec.exchange)'s status on Wednesday, 12-Nov-2025 05:28:03 JST J. R. DePriest :verified_trans: :donor: :Moopsy: :EA DATA. SF: J. R. DePriest :verified_trans: :donor: :Moopsy: :EA DATA. SF:
      in reply to
      • Haelwenn /элвэн/ :triskell:
      • Wolf480pl
      • Phantasm

      @phnt @sjvn @wolf480pl @lanodan working in threat management at a mid-sized company and prioritizing vulnerabilities is a full time job focusing on actual risk.

      CVEs are labels that make it easier to talk about specific vulnerabilities, nothing more.

      A "Zero CVE Policy" doesn't even make sense and is literally impossible without huge caveats and exceptions.

      Also, CVEs don't exist for misconfigurations. Which is a bigger risk? Default password on your external firewall or a CVE with a CVSS score of 10.0 on a dev server with no Internet access?

      AI Slop CVEs are a grift to "get those numbers up".

      In conversation about a month ago permalink
    • Embed this notice
      Wolf480pl (wolf480pl@mstdn.io)'s status on Wednesday, 12-Nov-2025 05:28:03 JST Wolf480pl Wolf480pl
      in reply to
      • Haelwenn /элвэн/ :triskell:
      • J. R. DePriest :verified_trans: :donor: :Moopsy: :EA DATA. SF:
      • Phantasm

      @jrdepriest @phnt @sjvn @lanodan
      Is there any hope for a small company with a handful of developers and 1 or 2 sysadmins to do anything about vulnerabilities?

      In conversation about a month ago permalink
    • Embed this notice
      J. R. DePriest :verified_trans: :donor: :Moopsy: :EA DATA. SF: (jrdepriest@infosec.exchange)'s status on Wednesday, 12-Nov-2025 05:28:03 JST J. R. DePriest :verified_trans: :donor: :Moopsy: :EA DATA. SF: J. R. DePriest :verified_trans: :donor: :Moopsy: :EA DATA. SF:
      in reply to
      • Haelwenn /элвэн/ :triskell:
      • Wolf480pl
      • Phantasm

      @wolf480pl @phnt @sjvn @lanodan I think the public, in general, puts too much pressure on small, mostly volunteer teams.

      On the one hand, these projects are vital lynchpins holding up trillion dollar industries.

      On the other, they apparently aren't worth a contact or even a donation by those using them.

      I imagine corporations would spend FTEs building complicated workarounds rather than fund an open source protect. They think, "someone else will step in and fix it, eventually."

      What can the small projects do? I don't know. So much of our infrastructure is designed around taking away their power while magnifying their responsibility. If it were me, I'd probably work myself to death trying to be everything for everybody. Ideally, they'd be able to go on strike. No fixes the leeches step up with people or funds. But that's taking your life into your own hands. That could end badly.

      I don't have a solution. The most important thing is to prioritize but with AI generated CVEs, I'm not sure the flood is manageable.

      My advice is that your mental health should come first. Always. Every day. Take care of yourself.

      In conversation about a month ago permalink

      Attachments


      Haelwenn /элвэн/ :triskell: likes this.
    • Embed this notice
      Haelwenn /элвэн/ :triskell: (lanodan@queer.hacktivis.me)'s status on Wednesday, 12-Nov-2025 05:38:00 JST Haelwenn /элвэн/ :triskell: Haelwenn /элвэн/ :triskell:
      in reply to
      • Wolf480pl
      • J. R. DePriest :verified_trans: :donor: :Moopsy: :EA DATA. SF:
      • Phantasm
      @phnt @jrdepriest @sjvn @wolf480pl Kind of makes me wonder if there's been malware patches sent via CVEs (there's probably been, in fact I feel like I've heard of that before).
      In conversation about a month ago permalink
    • Embed this notice
      Phantasm (phnt@fluffytail.org)'s status on Wednesday, 12-Nov-2025 05:38:01 JST Phantasm Phantasm
      in reply to
      • Haelwenn /элвэн/ :triskell:
      • Wolf480pl
      • J. R. DePriest :verified_trans: :donor: :Moopsy: :EA DATA. SF:
      @jrdepriest @sjvn @wolf480pl @lanodan
      >A "Zero CVE Policy" doesn't even make sense and is literally impossible without huge caveats and exceptions.
      No joke, the way it works is you apply every update some scanner tells you to without ever verifying if you are even affected. Is this option required for the vulnerability to work even compiled in? Don't care, update.

      >Default password on your external firewall
      Reminds of me lovely MikroTik and their totally not jank network firmware flashing utility (forgot the name) that by default added no password to the admin account. Flash a _RouterOS_ via the network while connected and accessible from the Internet = get infected withing seconds. At least they started to use a default password semi-recently I think.
      In conversation about a month ago permalink
    • Embed this notice
      Haelwenn /элвэн/ :triskell: (lanodan@queer.hacktivis.me)'s status on Wednesday, 12-Nov-2025 05:42:57 JST Haelwenn /элвэн/ :triskell: Haelwenn /элвэн/ :triskell:
      in reply to
      • Wolf480pl
      • J. R. DePriest :verified_trans: :donor: :Moopsy: :EA DATA. SF:
      • Phantasm
      @wolf480pl @jrdepriest @phnt @sjvn To me the way to achieve this is to offload on something like a distro, and then the rest you keep as small as possible so you can keep track of the releases + security announcements of the additional dependencies.

      But I don't think that's something most web dev companies can even just understand today, let alone follow.
      In conversation about a month ago permalink
    • Embed this notice
      Wolf480pl (wolf480pl@mstdn.io)'s status on Wednesday, 12-Nov-2025 05:42:58 JST Wolf480pl Wolf480pl
      in reply to
      • Haelwenn /элвэн/ :triskell:
      • J. R. DePriest :verified_trans: :donor: :Moopsy: :EA DATA. SF:
      • Phantasm

      @jrdepriest @phnt @sjvn @lanodan
      I guess I went on a tangent without making it clear:

      We all know the situation for small open-source projects with large corporate userbase is rough.

      But at least it's not the FOSS projects that'll get pwned if they miss something - the large corpos will.

      Then we started talking about how companies manage vulns, and whether they're doing it wrong.

      1/

      In conversation about a month ago permalink
    • Embed this notice
      Wolf480pl (wolf480pl@mstdn.io)'s status on Wednesday, 12-Nov-2025 05:42:58 JST Wolf480pl Wolf480pl
      in reply to
      • Haelwenn /элвэн/ :triskell:
      • J. R. DePriest :verified_trans: :donor: :Moopsy: :EA DATA. SF:
      • Phantasm

      @jrdepriest @phnt @sjvn @lanodan

      So my question was about how a small-to-medium company (eg. one whose product is a website) that can't dedicate a whole person to patch management could approach this problem without resorting to "get CVE scanner, filter by severity == critical, cry in a corner because there's still too much stuff".

      In conversation about a month ago permalink
    • Embed this notice
      Wolf480pl (wolf480pl@mstdn.io)'s status on Wednesday, 12-Nov-2025 05:54:13 JST Wolf480pl Wolf480pl
      in reply to
      • Haelwenn /элвэн/ :triskell:
      • J. R. DePriest :verified_trans: :donor: :Moopsy: :EA DATA. SF:
      • Phantasm

      @lanodan @phnt @jrdepriest @sjvn

      I wish I could go to the devs and tell them

      "No pypi, only use dependencies packaged in Debian. If you want a library that's not packaged in Debian, open a ticket with the SRE team, we'll package it. Rate limit: one library per month."

      Though I guess even that would be unsustainable.

      In conversation about a month ago permalink
      Haelwenn /элвэн/ :triskell: likes this.
    • Embed this notice
      Haelwenn /элвэн/ :triskell: (lanodan@queer.hacktivis.me)'s status on Wednesday, 12-Nov-2025 06:05:44 JST Haelwenn /элвэн/ :triskell: Haelwenn /элвэн/ :triskell:
      in reply to
      • Wolf480pl
      • J. R. DePriest :verified_trans: :donor: :Moopsy: :EA DATA. SF:
      • Phantasm

      @wolf480pl @phnt @jrdepriest @sjvn I think it's a cultural problem that then made things just seem unrealistic due to it impacting the ecosystem, like Debian has a *lot* of python libraries to choose from but searching for those is a mess, and then there's also things like libraries with hundreds of dependencies or really awkward (if not simply broken) buildsystems.

      Also PYTHONPATH is a thing so you wouldn't need to wait for packaging team during development, at least when there's already been a basic check on whether the library is viable (which seems to never be really done).

      In conversation about a month ago permalink
    • Embed this notice
      Haelwenn /элвэн/ :triskell: (lanodan@queer.hacktivis.me)'s status on Wednesday, 12-Nov-2025 06:18:22 JST Haelwenn /элвэн/ :triskell: Haelwenn /элвэн/ :triskell:
      in reply to
      • Wolf480pl
      • J. R. DePriest :verified_trans: :donor: :Moopsy: :EA DATA. SF:
      • Phantasm
      @wolf480pl @phnt @jrdepriest @sjvn Yeah, wouldn't be surprised of that, because some fields basically make it either impossible or a lunatic for anyone else to build their projects.

      Like presented in https://archive.fosdem.org/2018/schedule/event/how_to_make_package_managers_cry/
      In conversation about a month ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: archive.fosdem.org
        FOSDEM 2018 - How To Make Package Managers Cry
    • Embed this notice
      Wolf480pl (wolf480pl@mstdn.io)'s status on Wednesday, 12-Nov-2025 06:18:23 JST Wolf480pl Wolf480pl
      in reply to
      • Haelwenn /элвэн/ :triskell:
      • J. R. DePriest :verified_trans: :donor: :Moopsy: :EA DATA. SF:
      • Phantasm

      @lanodan @phnt @jrdepriest @sjvn
      I'm afraid there are whole fields whose python libs are not packaged by Debian... though to know for sure i should go through $dayjob's requirements.txt and see how much of that is packaged...

      In conversation about a month ago permalink
    • Embed this notice
      sjvn (sjvn@mastodon.social)'s status on Wednesday, 12-Nov-2025 06:18:42 JST sjvn sjvn
      in reply to
      • Haelwenn /элвэн/ :triskell:
      • daniel:// stenberg://
      • Wolf480pl
      • J. R. DePriest :verified_trans: :donor: :Moopsy: :EA DATA. SF:

      @lanodan @phnt@fluffytail.org @jrdepriest @wolf480pl There's been lots of AI garbage CVEs. I wrote about it a while back. https://www.zdnet.com/article/how-fake-security-reports-are-swamping-open-source-projects-thanks-to-ai/

      Check out @bagder cURL's creator and maintainer, and his endless battles against AI security spam.

      In conversation about a month ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: www.zdnet.com
        How fake security reports are swamping open-source projects, thanks to AI
        from @ZDNET
        Patch spam contains code that is downright wrong and nonfunctional. Even worse: It can introduce new vulnerabilities or backdoors. What's a developer to do?
      Haelwenn /элвэн/ :triskell: likes this.
    • Embed this notice
      Haelwenn /элвэн/ :triskell: (lanodan@queer.hacktivis.me)'s status on Wednesday, 12-Nov-2025 06:23:36 JST Haelwenn /элвэн/ :triskell: Haelwenn /элвэн/ :triskell:
      in reply to
      • Wolf480pl
      • J. R. DePriest :verified_trans: :donor: :Moopsy: :EA DATA. SF:
      • 🪨
      • Phantasm
      @Varpie @sjvn @wolf480pl @jrdepriest @phnt You're confusing deployment (offline dev server) and vulnerabilities in the code (CVEs).
      In conversation about a month ago permalink
    • Embed this notice
      🪨 (varpie@peculiar.florist)'s status on Wednesday, 12-Nov-2025 06:23:38 JST 🪨 🪨
      in reply to
      • Haelwenn /элвэн/ :triskell:
      • Wolf480pl
      • J. R. DePriest :verified_trans: :donor: :Moopsy: :EA DATA. SF:
      • Phantasm

      @jrdepriest @phnt @sjvn @wolf480pl @lanodan A score of 10.0 wouldn't be possible on a dev server with no internet access, since it would have a low exploitability.

      In conversation about a month ago permalink
    • Embed this notice
      Bart Veldhuizen 🚀 (bartv@mastodon.social)'s status on Wednesday, 12-Nov-2025 09:02:04 JST Bart Veldhuizen  🚀 Bart Veldhuizen 🚀
      in reply to

      @sjvn add more bugs that specifically break Google’s systems and nothing else

      In conversation about a month ago permalink
      prettygood likes this.
    • Embed this notice
      Haelwenn /элвэн/ :triskell: (lanodan@queer.hacktivis.me)'s status on Wednesday, 12-Nov-2025 13:09:32 JST Haelwenn /элвэн/ :triskell: Haelwenn /элвэн/ :triskell:
      in reply to
      • Wolf480pl
      • J. R. DePriest :verified_trans: :donor: :Moopsy: :EA DATA. SF:
      • 🪨
      • Phantasm
      @Varpie @sjvn @wolf480pl @jrdepriest @phnt Ah, so you're explaining the rhetorical question.
      In conversation about a month ago permalink
    • Embed this notice
      🪨 (varpie@peculiar.florist)'s status on Wednesday, 12-Nov-2025 13:09:33 JST 🪨 🪨
      in reply to
      • Haelwenn /элвэн/ :triskell:
      • Wolf480pl
      • J. R. DePriest :verified_trans: :donor: :Moopsy: :EA DATA. SF:
      • Phantasm

      @lanodan @sjvn @wolf480pl @jrdepriest @phnt Let me rephrase: it wouldn't be possible to exploit a 10.0 CVE vulnerability on a dev server without internet access, because a part of the CVSS score is the attack vector, and for a score of 10.0 you'd need an attack that can be easily made over a network, so the offline dev server can't be impacted. So that example is irrelevant.

      In conversation about a month ago permalink
    • Embed this notice
      fu (fu@libranet.de)'s status on Wednesday, 12-Nov-2025 16:13:56 JST fu fu
      in reply to
      • Henrik Pauli
      @phl I'm convinced that diffusers
      In conversation about a month ago permalink
    • Embed this notice
      Henrik Pauli (phl@mastodon.social)'s status on Wednesday, 12-Nov-2025 16:13:57 JST Henrik Pauli Henrik Pauli
      in reply to

      @sjvn Will Google create a fake community poll like they did with XSLT and try to replace this too?

      In conversation about a month ago permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.