Gentoo Logo

SKK Tools: Insecure temporary file creation


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200710-10 / skktools
Release Date October 12, 2007
Latest Revision October 12, 2007: 01
Impact normal
Exploitable local
Package Vulnerable versions Unaffected versions Architecture(s)
app-i18n/skktools < 1.2-r1 >= 1.2-r1 All supported architectures

Related bugreports: #193121


SKK insecurely creates temporary files.

2.  Impact Information


SKK is a Japanese input method for Emacs.


skkdic-expr.c insecurely writes temporary files to a location in the form $TMPDIR/skkdic$PID.{pag,dir,db}, where $PID is the process ID.


A local attacker could create symbolic links in the directory where the temporary files are written, pointing to a valid file somewhere on the filesystem that is writable by the user running the SKK software. When SKK writes the temporary file, the target valid file would then be overwritten with the contents of the SKK temporary file.

3.  Resolution Information


There is no known workaround at this time.


All SKK Tools users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-i18n/skktools-1.2-r1"

4.  References


Page updated October 12, 2007

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.