exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 4525-1

Debian Security Advisory 4525-1
Posted Sep 19, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4525-1 - Simon McVittie reported a flaw in ibus, the Intelligent Input Bus. Due to a misconfiguration during the setup of the DBus, any unprivileged user could monitor and send method calls to the ibus bus of another user, if able to discover the UNIX socket used by another user connected on a graphical environment. The attacker can take advantage of this flaw to intercept keystrokes of the victim user or modify input related configurations through DBus method calls.

tags | advisory
systems | linux, unix, debian
advisories | CVE-2019-14822
SHA-256 | 31d489a5bebac71abdc3f0ab3fc8c5ed659bf01c8d9d73d9e23f3dd1dda2087d

Debian Security Advisory 4525-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4525-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
September 18, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : ibus
CVE ID : CVE-2019-14822
Debian Bug : 940267

Simon McVittie reported a flaw in ibus, the Intelligent Input Bus. Due
to a misconfiguration during the setup of the DBus, any unprivileged
user could monitor and send method calls to the ibus bus of another
user, if able to discover the UNIX socket used by another user connected
on a graphical environment. The attacker can take advantage of this flaw
to intercept keystrokes of the victim user or modify input related
configurations through DBus method calls.

For the oldstable distribution (stretch), this problem has been fixed
in version 1.5.14-3+deb9u2.

For the stable distribution (buster), this problem has been fixed in
version 1.5.19-4+deb10u1.

We recommend that you upgrade your ibus packages.

For the detailed security status of ibus please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/ibus

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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BXb6
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close