On Apr 09 2024, anderson.jonath...@gmail.com wrote:

> - This xz backdoor injection unpacked attacker-controlled files and ran them 
> during `configure`. Newer build systems implement a build abstraction (aka 
> DSL) that acts similar to a sandbox and enforces rules (e.g. the only code 
> run during `meson setup` is from `meson.build` files and CMake). Generally 
> speaking the only way to disobey those rules is via an "escape" command (e.g. 
> `run_command()`) of which there are few. This reduces the task of auditing 
> the build scripts for sandbox-breaking malicious intent significantly, only 
> the "escapes" need investigation and they which should(tm) be rare for 
> well-behaved projects.

Just like you can put your backdoor in *.m4 files, you can put them in
*.cmake files.

-- 
Andreas Schwab, sch...@linux-m68k.org
GPG Key fingerprint = 7578 EB47 D4E5 4D69 2510  2552 DF73 E780 A9DA AEC1
"And now for something completely different."

Reply via email to