Sean Whitton and I confirmed the issue still occurs with Ghostscript 9.28rc2.

I reported the issue with Ghostscript here:
https://bugs.ghostscript.com/show_bug.cgi?id=701552

On Fri, Sep 6, 2019 at 1:58 AM Jonas Smedegaard <jo...@jones.dk> wrote:
>
> Quoting James R Barlow (2019-09-06 10:15:59)
> > On Thu, Sep 5, 2019 at 11:57 PM Jonas Smedegaard <jo...@jones.dk> wrote:
> > >
> > > Quoting Sean Whitton (2019-09-06 06:20:47)
> > > > On Sat 31 Aug 2019 at 03:58PM +02, Jonas Smedegaard wrote:
> > > >
> > > > > Possibly some of the other tools uses undocumented insecure
> > > > > ghostscript calls which was recently removed.
> > > > >
> > > > > To investigate that further, someone needs to extract the actual
> > > > > input (probably Postscript or PDF) and the exact command used to
> > > > > call ghostscript.
> > > >
> > > > This was indeed a problem and ocrmypdf upstream has fixed it in
> > > > the latest release.
> > >
> > > Ah, great that the cause has been located!
> > >
> > > ...and happy that my guess was correct :-)
> >
> > Not quite? ocrmypdf did not use any undocumented ghostscript calls. It
> > followed an example from Ghostscript's documentation almost verbatim
> > to generate a .ps from a template that tells Ghostscript to insert an
> > ICC profile, referenced by filename. Ghostscript 9.28 is disabling
> > access to all files from a .ps file unless safety is explicitly
> > disabled. So nothing undocumented or exploitable was happening. (But
> > it does make sense for Ghostscript to make the change.)
> >
> > It does mean any other software that uses Ghostscript to generate
> > PDF/X, PDF/E, or PDF/A is likely going to break as well with this
> > release.
>
> Thanks for the clarification - helps me not spread any further false
> information!
>
>  - Jonas
>
> --
>  * Jonas Smedegaard - idealist & Internet-arkitekt
>  * Tlf.: +45 40843136  Website: http://dr.jones.dk/
>
>  [x] quote me freely  [ ] ask before reusing  [ ] keep private

Reply via email to