uim is a simple, secure and flexible input method library.
Takumi Asaki discovered that uim insufficiently checks environment variables. setuid/setgid applications linked against libuim could end up executing arbitrary code. This vulnerability only affects immodule-enabled Qt (if you build Qt 3.3.2 or later versions with USE="immqt" or USE="immqt-bc").
A malicious local user could exploit this vulnerability to execute arbitrary code with escalated privileges.
There is no known workaround at this time.
All uim users should upgrade to the latest available version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-i18n/uim-0.4.5.1"