blob: 878b71a3975e2dea87a8dcef2876dbb6088b4798 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200502-31">
<title>uim: Privilege escalation vulnerability</title>
Under certain conditions, applications linked against uim suffer from a
privilege escalation vulnerability.
<product type="ebuild">uim</product>
<announced>February 28, 2005</announced>
<revised>February 28, 2005: 01</revised>
<package name="app-i18n/uim" auto="yes" arch="*">
<unaffected range="ge"></unaffected>
<vulnerable range="lt"></vulnerable>
uim is a simple, secure and flexible input method library.
Takumi Asaki discovered that uim insufficiently checks environment
variables. setuid/setgid applications linked against libuim could end
up executing arbitrary code. This vulnerability only affects
immodule-enabled Qt (if you build Qt 3.3.2 or later versions with
USE="immqt" or USE="immqt-bc").
<impact type="normal">
A malicious local user could exploit this vulnerability to execute
arbitrary code with escalated privileges.
There is no known workaround at this time.
All uim users should upgrade to the latest available version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=app-i18n/uim-;</code>
<uri link="">CAN-2005-0503</uri>
<uri link="">uim announcement</uri>
<metadata tag="requester" timestamp="Fri, 25 Feb 2005 09:53:35 +0000">
<metadata tag="submitter" timestamp="Sun, 27 Feb 2005 12:40:49 +0000">
<metadata tag="bugReady" timestamp="Mon, 28 Feb 2005 08:59:25 +0000">