FS#62785 - [imagemagick] Remove Security Workaround
Attached to Project:
Arch Linux
Opened by jayki (jayki) - Friday, 31 May 2019, 14:19 GMT
Last edited by Antonio Rojas (arojas) - Sunday, 21 July 2019, 13:21 GMT
Opened by jayki (jayki) - Friday, 31 May 2019, 14:19 GMT
Last edited by Antonio Rojas (arojas) - Sunday, 21 July 2019, 13:21 GMT
|
Details
Description:
Remove workaround introduced here: https://git.archlinux.org/svntogit/packages.git/commit/trunk?h=packages/imagemagick&id=4f25329acbad8372b4bbb45a7cdcd99752541d7c Ghostscript is updated since ages, there is no security issue anymore but the workaround/mitigation is still deployed even on new systems.. Additional info: * package version(s) 7.0.8.47-2 |
This task depends upon
Closed by Antonio Rojas (arojas)
Sunday, 21 July 2019, 13:21 GMT
Reason for closing: Fixed
Additional comments about closing: imagemagick 7.0.8.56-1
Sunday, 21 July 2019, 13:21 GMT
Reason for closing: Fixed
Additional comments about closing: imagemagick 7.0.8.56-1
"ImageMagick best practices strongly encourages you to configure a security policy.xml that suits your local environment. The policy is open by default. This affords maximum utility for ImageMagick installations that run in a sandboxed environment, perhaps in a Docker instance, or behind a firewall where security risks are greatly diminished as opposed to a public website."
Feel free to remove modifications as you wish.
$ convert artículo\ prensa\ problema\ casero-EN.pdf artículo\ prensa\ problema\ casero-EN.png
convert: attempt to perform an operation not allowed by the security policy `PDF' @ error/constitute.c/IsCoderAuthorized/408.
convert: no images defined `artículo prensa problema casero-EN.png' @ error/convert.c/ConvertImageCommand/3273.
Why won't you let me convert my PDF to PNG? I understand that this would be denied if the PDF to be converted had some security limitation but doing so as a rule seems absurd to me.
https://www.kb.cert.org/vuls/id/332928/
There were multiple security issues past 9.24 release, please improve your research: https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=ghostscript