Update of sr #110961 (project autoconf):

                Severity:            6 - Security => 2 - Minor              
                  Status:                    Done => Invalid                
                 Privacy:                 Private => Public                 
                 Summary: 3 Vulnerabilities Result in Code Execution upon
running `autoconf` with crafted `configure.ac` file => Arbitrary Code
Execution upon running `autoconf` with crafted `configure.ac` file

    _______________________________________________________

Follow-up Comment #3:

Recategorizing as non-security and changing resolution to "invalid" since the
bulk of the report is, in fact, invalid.  We do still appreciate your report,
since it brought to our attention that `m4_file_append` was unused and could
be removed.

For the record, the proper way (given the facilities available in Unix) to
deal with the possibility that a build-time operation could execute malicious
code, is to run that build in a "sandbox" environment -- a dedicated, non-root
user account with known-good PATH, etc., and that does not have write access
to anything else on the system.  See for example
https://guix.gnu.org/en/manual/en/html_node/Build-Environment-Setup.html for a
high level description of how to put together such an environment.

(Also, realize that even if you sandbox the build, you're still probably going
to _run the program_ with the privileges of a normal user, or maybe even root.
 No presently common desktop OS is designed to protect a user from the
programs they run; academic designs capable of this do exist, but they're very
different from Unix.)


    _______________________________________________________

Reply to this item at:

  <https://savannah.gnu.org/support/?110961>

_______________________________________________
Message sent via Savannah
https://savannah.gnu.org/


Reply via email to