From 103c3e0cd67eac44fc91cf7f0c6d45f56dd182e7 Mon Sep 17 00:00:00 2001 From: "James R. Barlow" Date: Mon, 1 Jan 2024 13:02:57 -0800 Subject: [PATCH] Drop Ghostscript CVE warning and adjust version down to 9.54 Most distros have probably now backported the CVE fix. Dropped version to 9.54 so RHEL 9 can use recent ocrmypdf. --- src/ocrmypdf/builtin_plugins/ghostscript.py | 10 +--------- 1 file changed, 1 insertion(+), 9 deletions(-) diff --git a/src/ocrmypdf/builtin_plugins/ghostscript.py b/src/ocrmypdf/builtin_plugins/ghostscript.py index 73d6f00d..27cbbd03 100644 --- a/src/ocrmypdf/builtin_plugins/ghostscript.py +++ b/src/ocrmypdf/builtin_plugins/ghostscript.py @@ -54,7 +54,7 @@ def check_options(options): program='gs', package='ghostscript', version_checker=ghostscript.version, - need_version='9.55', # Ubuntu 22.04's version + need_version='9.54', # RHEL 9's version; Ubuntu 22.04 has 9.55 ) gs_version = ghostscript.version() if gs_version in BLACKLISTED_GS_VERSIONS: @@ -62,14 +62,6 @@ def check_options(options): f"Ghostscript {gs_version} contains serious regressions and is not " "supported. Please upgrade to a newer version." ) - if gs_version < Version('10.02.0'): - log.warning( - f"The installed version of Ghostscript {gs_version}, contains a remote " - "code execution security vulnerability. Please upgrade to a newer " - "version. For details see CVE-2023-43115. The issue is not known to " - "affect OCRmyPDF or processing PDFs with Ghostscript, but upgrading " - "Ghostscript is recommended." - ) if options.output_type == 'pdfa': options.output_type = 'pdfa-2'