MGASA-2019-0284

Source
https://advisories.mageia.org/MGASA-2019-0284.html
Import Source
https://advisories.mageia.org/MGASA-2019-0284.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2019-0284
Related
Published
2019-09-21T11:07:28Z
Modified
2019-09-21T10:19:10Z
Summary
Updated ibus packages fix security vulnerability
Details

It was discovered that any unprivileged user could monitor and send method calls to the ibus bus of another user, due to a misconfiguration during the setup of the DBus server. When ibus is in use, a local attacker, who discovers the UNIX socket used by another user connected on a graphical environment, could use this flaw to intercept all keystrokes of the victim user or modify input related configurations through DBus method calls (CVE-2019-14822).

References
Credits

Affected packages

Mageia:7 / ibus

Package

Name
ibus
Purl
pkg:rpm/mageia/ibus?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.20-1.1.mga7

Ecosystem specific

{
    "section": "core"
}

Mageia:6 / ibus

Package

Name
ibus
Purl
pkg:rpm/mageia/ibus?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.16-3.1.mga6

Ecosystem specific

{
    "section": "core"
}