CVE-2009-5081

Source
https://nvd.nist.gov/vuln/detail/CVE-2009-5081
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2009-5081.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2009-5081
Related
Published
2011-06-30T15:55:01Z
Modified
2024-11-21T01:11:08Z
Summary
[none]
Details

The (1) config.guess, (2) contrib/groffer/perl/groffer.pl, and (3) contrib/groffer/perl/roff2.pl scripts in GNU troff (aka groff) 1.21 and earlier use an insufficient number of X characters in the template argument to the tempfile function, which makes it easier for local users to overwrite arbitrary files via a symlink attack on a temporary file, a different vulnerability than CVE-2004-0969.

References

Affected packages

Debian:11 / groff

Package

Name
groff
Purl
pkg:deb/debian/groff?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.20.1-5

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / groff

Package

Name
groff
Purl
pkg:deb/debian/groff?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.20.1-5

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / groff

Package

Name
groff
Purl
pkg:deb/debian/groff?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.20.1-5

Ecosystem specific

{
    "urgency": "unimportant"
}