You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa IBus

Sigurnosni nedostatak programskog paketa IBus

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-4134-3
March 24, 2020

ibus vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 19.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS

Summary:

IBus could allow local users to capture key strokes of other locally logged
in users.

Software Description:
– ibus: Intelligent Input Bus – core

Details:

USN-4134-1 fixed a vulnerability in IBus. The update caused a regression in
some Qt applications and the fix was subsequently reverted in
USN-4134-2. The regression has since been resolved and so this update fixes
the original vulnerability.

We apologize for the inconvenience.

Original advisory details:

Simon McVittie discovered that IBus did not enforce appropriate access
controls on its private D-Bus socket. A local unprivileged user who
discovers the IBus socket address of another user could exploit this to
capture the key strokes of the other user.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.10:
ibus 1.5.21-1~exp2ubuntu2.1

Ubuntu 18.04 LTS:
ibus 1.5.17-3ubuntu5.3

Ubuntu 16.04 LTS:
ibus 1.5.11-1ubuntu2.4

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
https://usn.ubuntu.com/4134-3
https://usn.ubuntu.com/4134-1
CVE-2019-14822

Package Information:
https://launchpad.net/ubuntu/+source/ibus/1.5.21-1~exp2ubuntu2.1
https://launchpad.net/ubuntu/+source/ibus/1.5.17-3ubuntu5.3
https://launchpad.net/ubuntu/+source/ibus/1.5.11-1ubuntu2.4
—–BEGIN PGP SIGNATURE—–

iQFOBAEBCgA4FiEEiOlTC8vdwgBRe16w9JjS2d59rZwFAl558LoaHGFsZXgubXVy
cmF5QGNhbm9uaWNhbC5jb20ACgkQ9JjS2d59rZxMQggAiEVvzIXBo1+gvSE8Z+g9
RQSAAUHKQ/0miSZORciWdACExMGhRYWNfKcWvGZebL4eVTjICCR9mqVRmX5A4epY
pBnnxWd5+WK+8v6izV2iIxRqq0fHtK/6uBVfShkjIESkAaVW/FEXxAEVdERXD3S2
z8p7a510BBU2z8yEyN6SoHz7FWPuh5FRcXQJAixX18FKJLsVzPTn3o+p3xTTytNd
iJ8uC8vMIWBt8gKcGK83/7j6gV5jQo7xZeiAv2+Y2LWbzRKHVbYAhjq0sHNyX/HI
pL+Wm5rYyvjU6YvFye7rh06dMC96p5tk0gtZy75MSM28/BOx5YvHRBjP30bnWnsb
Ig==
=XXfK
—–END PGP SIGNATURE——-

AutorJosip Papratovic
Cert idNCERT-REF-2020-03-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Kritične zero-day ranjivosti Microsoft Windowsa

Otkrivene su dvije kritične "zero-day" ranjivosti koje pogađaju sve Microsoft Windows verzije od Windows 7 na dalje. Ranjivosti su uzrokovane...

Close