SKK insecurely creates temporary files.
Package | app-i18n/skktools on all architectures |
---|---|
Affected versions | < 1.2-r1 |
Unaffected versions | >= 1.2-r1 |
SKK is a Japanese input method for Emacs.
skkdic-expr.c insecurely writes temporary files to a location in the form $TMPDIR/skkdic$PID.{pag,dir,db}, where $PID is the process ID.
A local attacker could create symbolic links in the directory where the temporary files are written, pointing to a valid file somewhere on the filesystem that is writable by the user running the SKK software. When SKK writes the temporary file, the target valid file would then be overwritten with the contents of the SKK temporary file.
There is no known workaround at this time.
All SKK Tools users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-i18n/skktools-1.2-r1"
Release date
October 12, 2007
Latest revision
October 12, 2007: 01
Severity
normal
Exploitable
local
Bugzilla entries