Debian Security Advisory
DSA-343-1 skk, ddskk -- insecure temporary file
- Date Reported:
- 08 Jul 2003
- Affected Packages:
- skk, ddskk
- Vulnerable:
- Yes
- Security database references:
- In the Bugtraq database (at SecurityFocus): BugTraq ID 8144.
In Mitre's CVE dictionary: CVE-2003-0539. - More information:
-
skk (Simple Kana to Kanji conversion program), does not take appropriate security precautions when creating temporary files. This bug could potentially be exploited to overwrite arbitrary files with the privileges of the user running Emacs and skk.
ddskk is derived from the same code, and contains the same bug.
For the stable distribution (woody) this problem has been fixed in skk version 10.62a-4woody1 and ddskk version 11.6.rel.0-2woody1.
For the unstable distribution (sid) this problem has been fixed in ddskk version 12.1.cvs.20030622-1, and skk will be fixed soon.
We recommend that you update your skk and ddskk packages.
- Fixed in:
-
Debian GNU/Linux 3.0 (woody)
- Source:
- http://security.debian.org/pool/updates/main/s/skk/skk_10.62a-4woody1.dsc
- http://security.debian.org/pool/updates/main/s/skk/skk_10.62a-4woody1.diff.gz
- http://security.debian.org/pool/updates/main/s/skk/skk_10.62a.orig.tar.gz
- http://security.debian.org/pool/updates/main/d/ddskk/ddskk_11.6.rel.0-2woody1.dsc
- http://security.debian.org/pool/updates/main/d/ddskk/ddskk_11.6.rel.0-2woody1.diff.gz
- http://security.debian.org/pool/updates/main/d/ddskk/ddskk_11.6.rel.0.orig.tar.gz
- http://security.debian.org/pool/updates/main/s/skk/skk_10.62a-4woody1.diff.gz
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/s/skk/skk_10.62a-4woody1_all.deb
- Alpha:
- http://security.debian.org/pool/updates/main/s/skk/skkserv_10.62a-4woody1_alpha.deb
- ARM:
- http://security.debian.org/pool/updates/main/s/skk/skkserv_10.62a-4woody1_arm.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/s/skk/skkserv_10.62a-4woody1_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/s/skk/skkserv_10.62a-4woody1_ia64.deb
- HPPA:
- http://security.debian.org/pool/updates/main/s/skk/skkserv_10.62a-4woody1_hppa.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/s/skk/skkserv_10.62a-4woody1_m68k.deb
- Big endian MIPS:
- http://security.debian.org/pool/updates/main/s/skk/skkserv_10.62a-4woody1_mips.deb
- Little endian MIPS:
- http://security.debian.org/pool/updates/main/s/skk/skkserv_10.62a-4woody1_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/s/skk/skkserv_10.62a-4woody1_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/s/skk/skkserv_10.62a-4woody1_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/s/skk/skkserv_10.62a-4woody1_sparc.deb
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/d/ddskk/ddskk_11.6.rel.0-2woody1_all.deb
MD5 checksums of the listed files are available in the original advisory.