[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

[RHSA-2003:242-01] Updated ddskk packages fix temporary file vulnerability



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated ddskk packages fix temporary file vulnerability
Advisory ID:       RHSA-2003:242-01
Issue date:        2003-08-11
Updated on:        2003-08-11
Product:           Red Hat Enterprise Linux
Keywords:          tmpfile
Cross references:  
Obsoletes:         
CVE Names:         CAN-2003-0539
- ---------------------------------------------------------------------

1. Topic:

Updated ddskk packages which fix a temporary file security issue are now
available.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - noarch
Red Hat Linux Advanced Workstation 2.1 - noarch
Red Hat Enterprise Linux ES version 2.1 - noarch
Red Hat Enterprise Linux WS version 2.1 - noarch

3. Problem description:

Daredevil SKK is a simple Kana to Kanji conversion program, an input method
of Japanese for Emacs.

ddskk does not take appropriate security precautions when creating
temporary files. This bug could potentially be exploited to overwrite
arbitrary files with the privileges of the user running Emacs and skk.  The
Common Vulnerabilities and Exposures project (cve.mitre.org) has allocated
the name CAN-2003-0539 to this issue.

All users of ddskk should upgrade to these erratum packages containing a
backported security patch that corrects this issue.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

98924 - CAN-2003-0539 ddskk temporary file vulnerability

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/ddskk-11.6.0-1.7.ent.src.rpm

noarch:
Available from Red Hat Network: ddskk-11.6.0-1.7.ent.noarch.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/ddskk-11.6.0-1.7.ent.src.rpm

noarch:
Available from Red Hat Network: ddskk-11.6.0-1.7.ent.noarch.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/ddskk-11.6.0-1.7.ent.src.rpm

noarch:
Available from Red Hat Network: ddskk-11.6.0-1.7.ent.noarch.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/ddskk-11.6.0-1.7.ent.src.rpm

noarch:
Available from Red Hat Network: ddskk-11.6.0-1.7.ent.noarch.rpm



7. Verification:

MD5 sum                          Package Name
- --------------------------------------------------------------------------
b7ae053d155cb5c1ce08db210529bdc2 2.1AS/en/os/SRPMS/ddskk-11.6.0-1.7.ent.src.rpm
488a757062ec45b963466bfaa205a10b 2.1AS/en/os/noarch/ddskk-11.6.0-1.7.ent.noarch.rpm
b7ae053d155cb5c1ce08db210529bdc2 2.1AW/en/os/SRPMS/ddskk-11.6.0-1.7.ent.src.rpm
488a757062ec45b963466bfaa205a10b 2.1AW/en/os/noarch/ddskk-11.6.0-1.7.ent.noarch.rpm
b7ae053d155cb5c1ce08db210529bdc2 2.1ES/en/os/SRPMS/ddskk-11.6.0-1.7.ent.src.rpm
488a757062ec45b963466bfaa205a10b 2.1ES/en/os/noarch/ddskk-11.6.0-1.7.ent.noarch.rpm
b7ae053d155cb5c1ce08db210529bdc2 2.1WS/en/os/SRPMS/ddskk-11.6.0-1.7.ent.src.rpm
488a757062ec45b963466bfaa205a10b 2.1WS/en/os/noarch/ddskk-11.6.0-1.7.ent.noarch.rpm


These packages are GPG signed by Red Hat for security.  Our key is
available from http://www.redhat.com/security/keys.html

You can verify each package with the following command:
    
    rpm --checksig -v <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    
    md5sum <filename>


8. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0539

9. Contact:

The Red Hat security contact is <secalert redhat com>.  More contact
details at http://www.redhat.com/solutions/security/news/contact.html

Copyright 2003 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE/N0TwXlSAg2UNWIIRAvTjAJ4rbsVrVcj3rj2x/KYgJ6AZRHB5owCglAxI
5RyMJRyAsIbTqmbpqE4gWj8=
=zyU1
-----END PGP SIGNATURE-----



[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]