On Tue, Jun 01, 2010 at 11:33:33AM +1000, Paul Szabo wrote:
> Please note remote execute-any-code security bugs in ghostscript:
> 
>   http://bugs.debian.org/583183
> 
> This package suggests ghostscript, and may be affected. Please
> evaluate the security of this package, and fix if needed.

Thanks for the heads-up.

sdf doesn't change the current directory.  It uses Ghostscript in some
cases to convert between figure formats (although it doesn't call it
directly, only via wrapper scripts such as ps2epsi which don't offer sdf
any control over whether -P- is used).  Figures are imported files, not
generated by sdf itself.

I would expect that sdf is almost always invoked in a user's working
directory, and the fact that it never tries to change to /tmp or
whatever should be sufficient to avoid problems.  If a user invokes it
in /tmp, then they might expect problems given that sdf has
open-arbitrary-file constructs of its own.

Is that good enough for you, or are you trying to achieve a higher level
of assurance?  If the latter, what could sdf reasonably do here?

Thanks,

-- 
Colin Watson                                       [cjwat...@debian.org]



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to