Debian Security Advisory

DSA-794-1 polygen -- programming error

Date Reported:
01 Sep 2005
Affected Packages:
polygen
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 325468.
In Mitre's CVE dictionary: CVE-2005-2656.
More information:

Justin Rye noticed that polygen generates precompiled grammar objects world-writable, which can be exploited by a local attacker to at least fill up the filesystem.

The old stable distribution (woody) does not contain the polygen package.

For the stable distribution (sarge) this problem has been fixed in version 1.0.6-7sarge1.

For the unstable distribution (sid) this problem has been fixed in version 1.0.6-9.

We recommend that you upgrade your polygen package.

Fixed in:

Debian GNU/Linux 3.1 (sarge)

Source:
http://security.debian.org/pool/updates/main/p/polygen/polygen_1.0.6-7sarge1.dsc
http://security.debian.org/pool/updates/main/p/polygen/polygen_1.0.6-7sarge1.diff.gz
http://security.debian.org/pool/updates/main/p/polygen/polygen_1.0.6.orig.tar.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/p/polygen/polygen-data_1.0.6-7sarge1_all.deb
http://security.debian.org/pool/updates/main/p/polygen/polygen_1.0.6-7sarge1_all.deb

MD5 checksums of the listed files are available in the original advisory.