blob: 2e9a8ab71544853f6bf93f1118677f9ade7eacbf [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200510-03">
<title>Uim: Privilege escalation vulnerability</title>
Under certain conditions, applications linked against Uim suffer from a
privilege escalation vulnerability.
<product type="ebuild">uim</product>
<announced>October 04, 2005</announced>
<revised>May 22, 2006: 02</revised>
<package name="app-i18n/uim" auto="yes" arch="*">
<unaffected range="ge"></unaffected>
<vulnerable range="lt"></vulnerable>
Uim is a multilingual input method library which provides secure and
useful input method for all languages.
Masanari Yamamoto discovered that Uim uses environment variables
incorrectly. This bug causes a privilege escalation if setuid/setgid
applications are linked to libuim. This bug only affects
immodule-enabled Qt (if you build Qt 3.3.2 or later versions with
USE="immqt" or USE="immqt-bc").
<impact type="normal">
A malicious local user could exploit this vulnerability to execute
arbitrary code with escalated privileges.
There is no known workaround at this time.
All Uim users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=app-i18n/uim-;</code>
<uri link="">Original advisory</uri>
<uri link="">CVE-2005-3149</uri>
<metadata tag="requester" timestamp="Sun, 02 Oct 2005 13:02:25 +0000">
<metadata tag="bugReady" timestamp="Sun, 02 Oct 2005 13:02:52 +0000">
<metadata tag="submitter" timestamp="Mon, 03 Oct 2005 09:56:44 +0000">