CVE-2009-5082 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5082): The (1) configure and (2) config.guess scripts in GNU troff (aka groff) 1.20.1 on Openwall GNU/*/Linux (aka Owl) improperly create temporary files upon a failure of the mktemp function, which makes it easier for local users to overwrite arbitrary files via a symlink attack on a temporary file. CVE-2009-5081 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5081): The (1) config.guess, (2) contrib/groffer/perl/groffer.pl, and (3) contrib/groffer/perl/roff2.pl scripts in GNU troff (aka groff) 1.21 and earlier use an insufficient number of X characters in the template argument to the tempfile function, which makes it easier for local users to overwrite arbitrary files via a symlink attack on a temporary file, a different vulnerability than CVE-2004-0969. CVE-2009-5080 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5080): The (1) contrib/eqn2graph/eqn2graph.sh, (2) contrib/grap2graph/grap2graph.sh, and (3) contrib/pic2graph/pic2graph.sh scripts in GNU troff (aka groff) 1.21 and earlier do not properly handle certain failed attempts to create temporary directories, which might allow local users to overwrite arbitrary files via a symlink attack on a file in a temporary directory, a different vulnerability than CVE-2004-1296. CVE-2009-5079 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5079): The (1) gendef.sh, (2) doc/fixinfo.sh, and (3) contrib/gdiffmk/tests/runtests.in scripts in GNU troff (aka groff) 1.21 and earlier allow local users to overwrite arbitrary files via a symlink attack on a gro#####.tmp or /tmp/##### temporary file. CVE-2009-5078 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5078): contrib/pdfmark/pdfroff.sh in GNU troff (aka groff) before 1.21 launches the Ghostscript program without the -dSAFER option, which allows remote attackers to create, overwrite, rename, or delete arbitrary files via a crafted document. CVE-2009-5044 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5044): contrib/pdfmark/pdfroff.sh in GNU troff (aka groff) before 1.21 allows local users to overwrite arbitrary files via a symlink attack on a pdf#####.tmp temporary file.
@security, some of these description says that 1.21 is affected. What do you think?
I think that the maintainers need to tell us whether we're good to stabilize, and which version they want us to stable.
Maintainers: ping ^
Maintainer timeout. Arches, please test and stabilize: =sys-apps/groff-1.22.2 Target arches: alpha amd64 arm hppa ia64 ppc ppc64 sparc x86
arm stable
amd64 stable
x86 stable
ia64 stable
Stable for HPPA.
alpha stable
ppc stable
ppc64 stable
sparc stable
GLSA request filed.
This issue was resolved and addressed in GLSA 201310-14 at http://security.gentoo.org/glsa/glsa-201310-14.xml by GLSA coordinator Chris Reffett (creffett).