From the Debian bug at $URL: According to pdfroff(1) (and my inspection of the source code), pdfroff uses $$ (the current pid) to create temporary files. This is extremely easy to predict, and thus, insecure. Please fix both the code and the documentation so that they securely generate (or reference) temporary files. There is a patch from Owl at: http://cvsweb.openwall.com/cgi/cvsweb.cgi/~checkout~/Owl/packages/groff/groff-1.20.1-owl-tmp.diff?rev=1.2;content-type=text%2Fplain
Does this affect latest stable? If not, latest testing?
Just compared the patch with the groff Git repo [0] and upstream still has not committed. However, there is no substance here proving a vulnerability exists. [0]: http://git.savannah.gnu.org/cgit/groff.git/tree/contrib/eqn2graph/eqn2graph.sh
Searching also reveals no CVE's related to this particular patch or issue per the source code files.