Update of sr #110961 (project autoconf):
Severity: 6 - Security => 2 - Minor
Status: Done => Invalid
Privacy: Private => Public
Summary: 3 Vulnerabilities Result in Code Execution upon
running `autoconf` with crafted `configure.ac` file => Arbitrary Code
Execution upon running `autoconf` with crafted `configure.ac` file
_______________________________________________________
Follow-up Comment #3:
Recategorizing as non-security and changing resolution to "invalid" since the
bulk of the report is, in fact, invalid. We do still appreciate your report,
since it brought to our attention that `m4_file_append` was unused and could
be removed.
For the record, the proper way (given the facilities available in Unix) to
deal with the possibility that a build-time operation could execute malicious
code, is to run that build in a "sandbox" environment -- a dedicated, non-root
user account with known-good PATH, etc., and that does not have write access
to anything else on the system. See for example
https://guix.gnu.org/en/manual/en/html_node/Build-Environment-Setup.html for a
high level description of how to put together such an environment.
(Also, realize that even if you sandbox the build, you're still probably going
to _run the program_ with the privileges of a normal user, or maybe even root.
No presently common desktop OS is designed to protect a user from the
programs they run; academic designs capable of this do exist, but they're very
different from Unix.)
_______________________________________________________
Reply to this item at:
<https://savannah.gnu.org/support/?110961>
_______________________________________________
Message sent via Savannah
https://savannah.gnu.org/