Under certain conditions, applications linked against uim suffer from a privilege escalation vulnerability.
|Package||app-i18n/uim on all architectures|
|Affected versions||< 0.4.5.1|
|Unaffected versions||>= 0.4.5.1|
uim is a simple, secure and flexible input method library.
Takumi Asaki discovered that uim insufficiently checks environment variables. setuid/setgid applications linked against libuim could end up executing arbitrary code. This vulnerability only affects immodule-enabled Qt (if you build Qt 3.3.2 or later versions with USE="immqt" or USE="immqt-bc").
A malicious local user could exploit this vulnerability to execute arbitrary code with escalated privileges.
There is no known workaround at this time.
All uim users should upgrade to the latest available version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-i18n/uim-0.4.5.1"
February 28, 2005
February 28, 2005: 01