Re: Bash security issue

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 25 Sep 2014 09:53:14 -0600
Eric Blake <eblake@xxxxxxxxxx> wrote:

> On 09/25/2014 09:45 AM, Shawn H Corey wrote:
> > On Thu, 25 Sep 2014 08:55:45 -0600
> > Eric Blake <eblake@xxxxxxxxxx> wrote:
> > 
> >> On 09/25/2014 07:51 AM, Bob Friesenhahn wrote:
> >>> It may be that some users of 'autoconf' will be at risk due to the
> >>> dire bash security bug described at
> >>> "http://www.theregister.co.uk/2014/09/24/bash_shell_vuln/";.
> >>>
> >>> Take care that the environment is carefully vetted.
> >>
> >> There's nothing that ./configure can do to avoid the buggy bash,
> >> but it may indeed be worth patching autoconf to generate configure
> >> scripts that issue a loud warning if the buggy shell is detected on
> >> the user's system.  I'll look into doing that.
> >>
> > 
> > You may be premature. I think the patch will be out before Monday.
> > If so, your effort will be wasted. :)
> 
> Huh? There is no wasted effort in teaching configure scripts to warn
> users that they are running on an unpatched vulnerable system.  Just
> because a fix may be available doesn't mean everyone is running the
> fix.
> 

That's only a partial solution. The problem is with bash(1), not your
scripts. If you warn about one security issue, then people will count
on you to warn them about _all_ the security issues. People are lazy
and will jump to conclusions to avoid work.

You should only worry about security for the software you are directly
responsible for. Otherwise, people will expect you to fix everything
and complain unfairly when you can't.


-- 
Don't stop where the ink does.
	Shawn

_______________________________________________
Autoconf mailing list
Autoconf@xxxxxxx
https://lists.gnu.org/mailman/listinfo/autoconf




[Index of Archives]     [GCC Help]     [Kernel Discussion]     [RPM Discussion]     [Red Hat Development]     [Yosemite News]     [Linux USB]     [Samba]

  Powered by Linux