Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20181016155722.32978ab2@jabberwock.cb.piermont.com>
Date: Tue, 16 Oct 2018 15:57:22 -0400
From: "Perry E. Metzger" <perry@...rmont.com>
To: Tavis Ormandy <taviso@...gle.com>
Cc: oss-security@...ts.openwall.com
Subject: Re: ghostscript: 1Policy operator gives access to
 .forceput CVE-2018-18284

On Tue, 16 Oct 2018 11:06:14 -0700 Tavis Ormandy <taviso@...gle.com>
wrote:
> Side note: I'm done looking at ghostscript for now, but still
> *strongly* recommend that we deprecate untrusted postscript and
> disable ghostscript coders by default in policy.xml.

Again, given that PostScript is an archival format for a lot of
documents, wouldn't a version of ghostscript with all the ability to
do anything dangerous removed from the interpreter at compile time be
rational?

(And yes, it wouldn't be "standard" but I don't know that I
care much about that, and it would mean it would be safe to look at
30 year old PS documents that are often the only way to look at
some old academic paper. I look at such things at least a couple of
times a month. If Artifex isn't willing to do this, it's open
source, someone else should.)

Perry
-- 
Perry E. Metzger		perry@...rmont.com

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.