On Sat, Jul 25, 2009 at 09:30:18AM +0100, Colin Watson wrote:
> See attached report; this is indeed a standard anti-pattern resulting in
> security vulnerabilities. In Debian I'd be rather tempted to use 'mktemp
> -d' to fix this. What do you think?

Nico Golde points out that Openwall have a patch for this. I'm applying
this to the Debian package:

  curl -s 
'http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff'
 | filterdiff -i '*pdfroff*'

Thanks,

-- 
Colin Watson                                       [[email protected]]


_______________________________________________
bug-groff mailing list
[email protected]
http://lists.gnu.org/mailman/listinfo/bug-groff

Reply via email to