|
Message-ID: <CAJ_zFkJog41qbQ6DgP=jcEts-pDo+z1AKhcnYC7kJCri=+5qSQ@mail.gmail.com> Date: Tue, 16 Oct 2018 13:33:32 -0700 From: Tavis Ormandy <taviso@...gle.com> To: Perry Metzger <perry@...rmont.com> Cc: oss-security@...ts.openwall.com Subject: Re: ghostscript: 1Policy operator gives access to .forceput CVE-2018-18284 On Tue, Oct 16, 2018 at 12:57 PM Perry E. Metzger <perry@...rmont.com> wrote: > On Tue, 16 Oct 2018 11:06:14 -0700 Tavis Ormandy <taviso@...gle.com> > wrote: > > Side note: I'm done looking at ghostscript for now, but still > > *strongly* recommend that we deprecate untrusted postscript and > > disable ghostscript coders by default in policy.xml. > > Again, given that PostScript is an archival format for a lot of > documents, wouldn't a version of ghostscript with all the ability to > do anything dangerous removed from the interpreter at compile time be > rational? > > We have to work with what we've got. Even with the easy to exploit stuff compiled out (which upstream do not support), I haven't been bothering to get CVE's for all the memory corruption or UaF I've been reporting, because nobody can keep up with these operator leaks anyway. Tavis.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.