uim: Privilege escalation vulnerability — GLSA 200502-31

Under certain conditions, applications linked against uim suffer from a privilege escalation vulnerability.

Affected packages

app-i18n/uim on all architectures
Affected versions < 0.4.5.1
Unaffected versions >= 0.4.5.1

Background

uim is a simple, secure and flexible input method library.

Description

Takumi Asaki discovered that uim insufficiently checks environment variables. setuid/setgid applications linked against libuim could end up executing arbitrary code. This vulnerability only affects immodule-enabled Qt (if you build Qt 3.3.2 or later versions with USE="immqt" or USE="immqt-bc").

Impact

A malicious local user could exploit this vulnerability to execute arbitrary code with escalated privileges.

Workaround

There is no known workaround at this time.

Resolution

All uim users should upgrade to the latest available version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-i18n/uim-0.4.5.1"

References

Release date
February 28, 2005

Latest revision
February 28, 2005: 01

Severity
normal

Exploitable
local

Bugzilla entries