Under certain conditions, applications linked against uim suffer from a privilege escalation vulnerability.
Package | app-i18n/uim on all architectures |
---|---|
Affected versions | < 0.4.5.1 |
Unaffected versions | >= 0.4.5.1 |
uim is a simple, secure and flexible input method library.
Takumi Asaki discovered that uim insufficiently checks environment variables. setuid/setgid applications linked against libuim could end up executing arbitrary code. This vulnerability only affects immodule-enabled Qt (if you build Qt 3.3.2 or later versions with USE="immqt" or USE="immqt-bc").
A malicious local user could exploit this vulnerability to execute arbitrary code with escalated privileges.
There is no known workaround at this time.
All uim users should upgrade to the latest available version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-i18n/uim-0.4.5.1"
Release date
February 28, 2005
Latest revision
February 28, 2005: 01
Severity
normal
Exploitable
local
Bugzilla entries