Mageia 2019-0284: ibus security update

    Date21 Sep 2019
    CategoryMageia
    317
    Posted ByLinuxSecurity Advisories
    Mageia Large
    It was discovered that any unprivileged user could monitor and send method calls to the ibus bus of another user, due to a misconfiguration during the setup of the DBus server. When ibus is in use, a local attacker, who discovers the UNIX socket used by another user connected on a graphical environment, could use this flaw to intercept all keystrokes of the victim user or modify
    MGASA-2019-0284 - Updated ibus packages fix security vulnerability
    
    Publication date: 21 Sep 2019
    URL: https://advisories.mageia.org/MGASA-2019-0284.html
    Type: security
    Affected Mageia releases: 6, 7
    CVE: CVE-2019-14822
    
    It was discovered that any unprivileged user could monitor and send method
    calls to the ibus bus of another user, due to a misconfiguration during the
    setup of the DBus server. When ibus is in use, a local attacker, who discovers
    the UNIX socket used by another user connected on a graphical environment,
    could use this flaw to intercept all keystrokes of the victim user or modify
    input related configurations through DBus method calls (CVE-2019-14822).
    
    References:
    - https://bugs.mageia.org/show_bug.cgi?id=25434
    - https://www.openwall.com/lists/oss-security/2019/09/13/1
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14822
    
    SRPMS:
    - 7/core/ibus-1.5.20-1.1.mga7
    - 6/core/ibus-1.5.16-3.1.mga6
    

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"38","type":"x","order":"1","pct":52.05,"resources":[]},{"id":"88","title":"Should be more technical","votes":"10","type":"x","order":"2","pct":13.7,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"25","type":"x","order":"3","pct":34.25,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.