[37839] in bugtraq

home help back first fref pref prev next nref lref last post

[USN-43-1] groff utility vulnerabilities

daemon@ATHENA.MIT.EDU (Martin Pitt)
Mon Dec 20 18:17:09 2004

Date: Mon, 20 Dec 2004 19:23:20 +0100
From: Martin Pitt <martin.pitt@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Cc: full-disclosure@lists.netsys.com, bugtraq@securityfocus.com
Message-ID: <20041220182320.GA13682@box79162.elkhouse.de>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
	protocol="application/pgp-signature"; boundary="PEIAKu/WMn1b1Hv9"
Content-Disposition: inline


--PEIAKu/WMn1b1Hv9
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-43-1		  December 20, 2004
groff vulnerabilities
http://bugs.debian.org/286371,=20
http://bugs.debian.org/286372
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)

The following packages are affected:

groff

The problem can be corrected by upgrading the affected package to
version 1.18.1.1-1ubuntu0.2. In general, a standard system upgrade is
sufficient to effect the necessary changes.

Details follow:

Javier Fern=E1ndez-Sanguino Pe=F1a discovered that the auxiliary scripts
"eqn2graph" and "pic2graph" created temporary files in an insecure
way, which allowed exploitation of a race condition to create or
overwrite files with the privileges of the user invoking the program.

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/g/groff/groff_1.18.1.1-1ubu=
ntu0.2.diff.gz
      Size/MD5:   122991 0d247788b6e83f87718c996f0fd05e41
    http://security.ubuntu.com/ubuntu/pool/main/g/groff/groff_1.18.1.1-1ubu=
ntu0.2.dsc
      Size/MD5:      715 92ca1b33ea0907aa6d4eda3db4930c51
    http://security.ubuntu.com/ubuntu/pool/main/g/groff/groff_1.18.1.1.orig=
=2Etar.gz
      Size/MD5:  2260623 511dbd64b67548c99805f1521f82cc5e

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/g/groff/groff-base_1.18.1.1=
-1ubuntu0.2_amd64.deb
      Size/MD5:   856342 920534f39127c7216e62b1122fbe3c18
    http://security.ubuntu.com/ubuntu/pool/main/g/groff/groff_1.18.1.1-1ubu=
ntu0.2_amd64.deb
      Size/MD5:  1890064 f012658b3b6a9aaf9151dd9aa34cc3d1

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/g/groff/groff-base_1.18.1.1=
-1ubuntu0.2_i386.deb
      Size/MD5:   807612 52dc8a36fd9838ff546a2b09e48f6b12
    http://security.ubuntu.com/ubuntu/pool/main/g/groff/groff_1.18.1.1-1ubu=
ntu0.2_i386.deb
      Size/MD5:  1843076 677a86c7457eed2880100c122bcc75fd

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/g/groff/groff-base_1.18.1.1=
-1ubuntu0.2_powerpc.deb
      Size/MD5:   860678 b2a2a921dcdbb0acc520c7de969a5104
    http://security.ubuntu.com/ubuntu/pool/main/g/groff/groff_1.18.1.1-1ubu=
ntu0.2_powerpc.deb
      Size/MD5:  1885062 e97f22decb7cc85fb32d76bc29f6d89a

--PEIAKu/WMn1b1Hv9
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFBxxiYDecnbV4Fd/IRAtl6AJ47PPzEOTxucAT3jW9ufaNsj3ez9gCgvMwR
tjn88AQCl4L+DRGTMxojteQ=
=r5vg
-----END PGP SIGNATURE-----

--PEIAKu/WMn1b1Hv9--

home help back first fref pref prev next nref lref last post