On Sat, Jul 25, 2009 at 09:30:18AM +0100, Colin Watson wrote: > See attached report; this is indeed a standard anti-pattern resulting in > security vulnerabilities. In Debian I'd be rather tempted to use 'mktemp > -d' to fix this. What do you think?
Nico Golde points out that Openwall have a patch for this. I'm applying this to the Debian package: curl -s 'http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff' | filterdiff -i '*pdfroff*' Thanks, -- Colin Watson [[email protected]] _______________________________________________ bug-groff mailing list [email protected] http://lists.gnu.org/mailman/listinfo/bug-groff
