-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2013:085 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : groff Date : April 9, 2013 Affected: Enterprise Server 5.0 _______________________________________________________________________ Problem Description: Multiple vulnerabilities has been found and corrected in groff: contrib/pdfmark/pdfroff.sh in GNU troff (aka groff) before 1.21 allows local users to overwrite arbitrary files via a symlink attack on a pdf#####.tmp temporary file (CVE-2009-5044). The (1) gendef.sh, (2) doc/fixinfo.sh, and (3) contrib/gdiffmk/tests/runtests.in scripts in GNU troff (aka groff) 1.21 and earlier allow local users to overwrite arbitrary files via a symlink attack on a gro#####.tmp or /tmp/##### temporary file (CVE-2009-5079). The (1) contrib/eqn2graph/eqn2graph.sh, (2) contrib/grap2graph/grap2graph.sh, and (3) contrib/pic2graph/pic2graph.sh scripts in GNU troff (aka groff) 1.21 and earlier do not properly handle certain failed attempts to create temporary directories, which might allow local users to overwrite arbitrary files via a symlink attack on a file in a temporary directory, a different vulnerability than CVE-2004-1296 (CVE-2009-5080). The updated packages have been patched to correct these issues. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5044 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5079 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5080 _______________________________________________________________________ Updated Packages: Mandriva Enterprise Server 5: 8aba0ff61c017d1c994ed5050891a82a mes5/i586/groff-1.19.1-12.1mdvmes5.2.i586.rpm 03e9c6c5e5d664626134b4f76fb63208 mes5/i586/groff-for-man-1.19.1-12.1mdvmes5.2.i586.rpm 0022b4ead2f298880a470f1c102bd2be mes5/i586/groff-gxditview-1.19.1-12.1mdvmes5.2.i586.rpm 46d6db989c131234eba38ab967f87884 mes5/i586/groff-perl-1.19.1-12.1mdvmes5.2.i586.rpm 04a7b612a6b8ac86a00d4312e495f608 mes5/SRPMS/groff-1.19.1-12.1mdvmes5.2.src.rpm Mandriva Enterprise Server 5/X86_64: d1519acc803ead88290db5da6b1795c9 mes5/x86_64/groff-1.19.1-12.1mdvmes5.2.x86_64.rpm 969cb6ced3a1d3a21d454256ea136f61 mes5/x86_64/groff-for-man-1.19.1-12.1mdvmes5.2.x86_64.rpm 51877be8460781a183eb35f8f79ef2b2 mes5/x86_64/groff-gxditview-1.19.1-12.1mdvmes5.2.x86_64.rpm 7118c0e6aa623f8ac96b943213b3ff94 mes5/x86_64/groff-perl-1.19.1-12.1mdvmes5.2.x86_64.rpm 04a7b612a6b8ac86a00d4312e495f608 mes5/SRPMS/groff-1.19.1-12.1mdvmes5.2.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/en/support/security/advisories/ If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iD8DBQFRY/wOmqjQ0CJFipgRAmk+AKDHkDYrU3rhd93mZY26CY3iYvKEQACeKq7q aTTSwE0KLSlyjhv7eULfQWI= =WzfK -----END PGP SIGNATURE-----