Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 372201

Summary: sys-apps/groff: Insecure Temp File Usage by pdfroff
Product: Gentoo Security Reporter: Tim Sammut (RETIRED) <underling>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED NEEDINFO    
Severity: normal CC: base-system
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=538330
Whiteboard: A3 [upstream/ebuild]
Package list:
Runtime testing required: ---

Description Tim Sammut (RETIRED) gentoo-dev 2011-06-18 18:51:48 UTC
From the Debian bug at $URL:

According to pdfroff(1) (and my inspection of the source code), pdfroff
uses $$ (the current pid) to create temporary files.  This is extremely
easy to predict, and thus, insecure.

Please fix both the code and the documentation so that they securely
generate (or reference) temporary files.


There is a patch from Owl at:
http://cvsweb.openwall.com/cgi/cvsweb.cgi/~checkout~/Owl/packages/groff/groff-1.20.1-owl-tmp.diff?rev=1.2;content-type=text%2Fplain
Comment 1 Chris Reffett (RETIRED) gentoo-dev Security 2013-09-12 22:07:04 UTC
Does this affect latest stable? If not, latest testing?
Comment 2 Aaron Bauman (RETIRED) gentoo-dev 2016-03-18 11:09:15 UTC
Just compared the patch with the groff Git repo [0] and upstream still has not committed.  However, there is no substance here proving a vulnerability exists.

[0]: http://git.savannah.gnu.org/cgit/groff.git/tree/contrib/eqn2graph/eqn2graph.sh
Comment 3 Aaron Bauman (RETIRED) gentoo-dev 2016-03-18 11:09:54 UTC
Searching also reveals no CVE's related to this particular patch or issue per the source code files.