> > On Nov 2, 2022, at 2:56 PM, Clemens Lang <c...@macports.org > <mailto:c...@macports.org>> wrote: > > On Tue, Nov 01, 2022 at 07:04:40PM +0100, Kirill A. Korinsky via macports-dev > wrote: >> OpenSSL team released a fix for found CVE: >> https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/ >> <https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/> >> >> >> May I ask someone to review a PR to fix this CVE? >> >> https://github.com/macports/macports-ports/pull/16545 >> >> I think that this CVE should be a reason to merge such PR ASAP without >> maintainers confirmation. > > I deal with OpenSSL for a living at my day job, so I was aware of this. > > November 1st was a public holiday where I live, so I did not spend the > entire day at my desk. I had planned to do the update in the CET evening > hours of November 1st, but your PR beat me to it. > > > On Tue, Nov 01, 2022 at 04:45:26PM -0400, Daniel J. Luke wrote: >> I don't mind waiting a bit for the maintainer for this one (especially >> since it looks like it's already been approved and merged by the >> maintainer :) ), but the policy that allows waiving maintainer >> permission was intended to specifically cover security issues (ie. we >> discussed this when creating the policy and decided that point that >> says 'A critical port is broken that affects many users' covered >> security fixes to ports). > > This is correct. We have previously merged security fixes without > waiting for the maintainer. This would also have been OK in this > instance. > > Speaking of this CVE… we don't actually build with the common set of > security flags in MacPorts, do we? We should probably look into getting > the common set -fstack-protector-strong -fstack-clash-protection -fPIE > (probably not required on modern macOS?) -D_FORTIFY_SOURCE=3 > -fcf-protection=full (on x86_64) and maybe -Wl,-bind_at_load > -Wl,-read_only_stubs.
I’ve been thinking the same thing as I compile packages on my FreeBSD machines and see these flags over and over again. > Does anybody have a good overview of what the recommended set of > security compiler flags is on macOS? Quick testing suggests everything > but -fstack-protector-strong and -D_FORTIFY_SOURCE is already on by > default. Marius -- Marius Schamschula