Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAJ_zFkJog41qbQ6DgP=jcEts-pDo+z1AKhcnYC7kJCri=+5qSQ@mail.gmail.com>
Date: Tue, 16 Oct 2018 13:33:32 -0700
From: Tavis Ormandy <taviso@...gle.com>
To: Perry Metzger <perry@...rmont.com>
Cc: oss-security@...ts.openwall.com
Subject: Re: ghostscript: 1Policy operator gives access to
 .forceput CVE-2018-18284

On Tue, Oct 16, 2018 at 12:57 PM Perry E. Metzger <perry@...rmont.com>
wrote:

> On Tue, 16 Oct 2018 11:06:14 -0700 Tavis Ormandy <taviso@...gle.com>
> wrote:
> > Side note: I'm done looking at ghostscript for now, but still
> > *strongly* recommend that we deprecate untrusted postscript and
> > disable ghostscript coders by default in policy.xml.
>
> Again, given that PostScript is an archival format for a lot of
> documents, wouldn't a version of ghostscript with all the ability to
> do anything dangerous removed from the interpreter at compile time be
> rational?
>
>
We have to work with what we've got.

Even with the easy to exploit stuff compiled out (which upstream do not
support), I haven't been bothering to get CVE's for all the memory
corruption or UaF I've been reporting, because nobody can keep up with
these operator leaks anyway.

Tavis.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.