uim: privilege escalation before 0.4.9.1

Bug #3328 reported by Yagisan
4
Affects Status Importance Assigned to Milestone
uim (Ubuntu)
Fix Released
Medium
MOTU
Breezy
Fix Released
Medium
MOTU

Bug Description

All uim releases before 0.4.9.1 have a security bug, which causes
privilege escalation if applications linked to libuim is set
setuid/setgid.

Patch is here http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=331620

CVE References

Changed in uim:
assignee: nobody → motu
Changed in uim:
status: New → Accepted
Revision history for this message
Benjamin Montgomery (bmonty) wrote : uim_0.4.7-1ubuntu2.debdiff

This debdiff fixes this issue for the uim in breezy. It has been sent to <email address hidden>.

Revision history for this message
Benjamin Montgomery (bmonty) wrote :

Sent a request to the debian maintainer to remove the pm-dev build depend from the debian package. If this depend is removed, we can sync uim from debian. If not, we will have to create another ubuntu version of the uim package for dapper.

Changed in uim:
assignee: nobody → motu
status: New → Accepted
Changed in uim:
status: Accepted → Fixed
status: Accepted → Fixed
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.