summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorMANTANI Nobutaka <nobutaka@FreeBSD.org>2005-10-01 16:35:20 +0000
committerMANTANI Nobutaka <nobutaka@FreeBSD.org>2005-10-01 16:35:20 +0000
commit48c0ea36178e0ca17a51435da4c9c95888b3d5b8 (patch)
treebe93c2f8be801c2d5d971ff316a42ce7699eceda /security
parentFix spining on CPU due illegal pthread_cond_wait() usage. (diff)
Document japanese/uim privilege escalation vulnerability.
Notes
Notes: svn path=/head/; revision=143910
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml31
1 files changed, 31 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index c7cc3b6c3045..d6ff4a47c0e3 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,37 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="1e606080-3293-11da-ac91-020039488e34">
+ <topic>uim -- privilege escalation vulnerability</topic>
+ <affects>
+ <package>
+ <name>ja-uim</name>
+ <range><lt>0.4.9.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The uim developers reports:</p>
+ <blockquote cite="INSERT URL HERE">
+ <p>Masanari Yamamoto discovered that incorrect use
+ of environment variables in uim. This bug causes
+ privilege escalation if setuid/setgid applications
+ was linked to libuim.</p>
+ <p>This bug appears in 'immodule for Qt' enabled Qt.
+ (Normal Qt is also safe.) In some distribution,
+ mlterm is also an setuid/setgid application.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://lists.freedesktop.org/archives/uim/2005-September/001346.html</url>
+ </references>
+ <dates>
+ <discovery>2005-09-28</discovery>
+ <entry>2005-10-01</entry>
+ </dates>
+ </vuln>
+
<vuln vid="8688d5cd-328c-11da-a263-0001020eed82">
<topic>cfengine -- arbitrary file overwriting vulnerability</topic>
<affects>