openbsd-ports/textproc/groff
schwarze 2ad97ee4b1 Following http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=538330,
Solar Designer did an audit of temp file handling in groff-1.20.
He found and fixed *lots* of ugliness, but most does not look
exploitable and some was already improved in groff-1.21.

This is my own fix for the only one that, with a huge amount of extra
paranoia, might be worth patching.  To mount an exploit, the attacker
would need to trick root into setting an unusable TMPDIR (or similar)
variable in the environment such that mktemp -d fails, then convince
root to run pdfroff (*you* don't run that as root, do you?), then
handle a race condition to find the PID and predict the temp file
name to mount a symlink attack.

"I think we should still go for the fix" jasper@
2011-06-23 12:14:51 +00:00
..
patches Following http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=538330, 2011-06-23 12:14:51 +00:00
pkg Support upgrades from both groff-1.15+groff-mdoc 2011-03-20 17:30:24 +00:00
distinfo First major OpenBSD groff update since 2000. 2011-03-19 16:48:53 +00:00
Makefile Following http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=538330, 2011-06-23 12:14:51 +00:00