Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 372201 - sys-apps/groff: Insecure Temp File Usage by pdfroff
Summary: sys-apps/groff: Insecure Temp File Usage by pdfroff
Status: RESOLVED NEEDINFO
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal
Assignee: Gentoo Security
URL: http://bugs.debian.org/cgi-bin/bugrep...
Whiteboard: A3 [upstream/ebuild]
Keywords:
Depends on:
Blocks:
 
Reported: 2011-06-18 18:51 UTC by Tim Sammut (RETIRED)
Modified: 2016-03-18 11:09 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Tim Sammut (RETIRED) gentoo-dev 2011-06-18 18:51:48 UTC
From the Debian bug at $URL:

According to pdfroff(1) (and my inspection of the source code), pdfroff
uses $$ (the current pid) to create temporary files.  This is extremely
easy to predict, and thus, insecure.

Please fix both the code and the documentation so that they securely
generate (or reference) temporary files.


There is a patch from Owl at:
http://cvsweb.openwall.com/cgi/cvsweb.cgi/~checkout~/Owl/packages/groff/groff-1.20.1-owl-tmp.diff?rev=1.2;content-type=text%2Fplain
Comment 1 Chris Reffett (RETIRED) gentoo-dev Security 2013-09-12 22:07:04 UTC
Does this affect latest stable? If not, latest testing?
Comment 2 Aaron Bauman (RETIRED) gentoo-dev 2016-03-18 11:09:15 UTC
Just compared the patch with the groff Git repo [0] and upstream still has not committed.  However, there is no substance here proving a vulnerability exists.

[0]: http://git.savannah.gnu.org/cgit/groff.git/tree/contrib/eqn2graph/eqn2graph.sh
Comment 3 Aaron Bauman (RETIRED) gentoo-dev 2016-03-18 11:09:54 UTC
Searching also reveals no CVE's related to this particular patch or issue per the source code files.