Mageia 2019-0284: ibus security update
Summary
It was discovered that any unprivileged user could monitor and send method
calls to the ibus bus of another user, due to a misconfiguration during the
setup of the DBus server. When ibus is in use, a local attacker, who discoversthe UNIX socket used by another user connected on a graphical environment,
could use this flaw to intercept all keystrokes of the victim user or modify
input related configurations through DBus method calls (CVE-2019-14822).
References
- https://bugs.mageia.org/show_bug.cgi?id=25434
- https://www.openwall.com/lists/oss-security/2019/09/13/1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14822
Resolution
MGASA-2019-0284 - Updated ibus packages fix security vulnerability
SRPMS
- 7/core/ibus-1.5.20-1.1.mga7
- 6/core/ibus-1.5.16-3.1.mga6