oss-sec mailing list archives

Re: ghostscript: bypassing executeonly to escape -dSAFER sandbox (CVE-2018-17961)


From: Bob Friesenhahn <bfriesen () simple dallas tx us>
Date: Tue, 9 Oct 2018 17:14:45 -0500 (CDT)

On Tue, 9 Oct 2018, Tavis Ormandy wrote:

I think we should encourage switching to other document formats that we
have a better handle on securing. If you do need untrusted ps, I think
treating it the same as shell script file you downloaded from the internet.

Due to its valuable current usages (e.g. printing and format conversion) and its long legacy, Postscript is still a vital format to support in open source software.

How can software consuming Postscript be aware of its origin unless it is known to be produced directly by another application?

Edge applications such as web browsers may be able to help by adding warning dialogs when knowingly downloading Postscript content.

Bob
--
Bob Friesenhahn
bfriesen () simple dallas tx us, http://www.simplesystems.org/users/bfriesen/
GraphicsMagick Maintainer,    http://www.GraphicsMagick.org/


Current thread: