A flaw was discovered in ibus in versions before 1.5.22 that allows any unprivileged user to monitor and send method calls to the ibus bus of another user due to a misconfiguration in the DBus server setup. A local attacker may use this flaw to intercept all keystrokes of a victim user who is using the graphical interface, change the input method engine, or modify other input related configurations of the victim user.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1717958 | Issue Tracking Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14822 | Issue Tracking Patch Third Party Advisory |
https://usn.ubuntu.com/4134-3/ | Third Party Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2019-11-25T11:01:18
Updated: 2022-04-19T23:20:12
Reserved: 2019-08-10T00:00:00
Link: CVE-2019-14822
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-11-25T12:15:11.427
Modified: 2022-06-07T18:41:36.877
Link: CVE-2019-14822
JSON object: View
Redhat Information
No data.
CWE