USN-4134-1: IBus vulnerability

Publication date

16 September 2019

Overview

IBus would allow local users to capture key strokes of other locally logged in users.


Packages

  • ibus - Intelligent Input Bus - core

Details

Simon McVittie discovered that IBus did not enforce appropriate access
controls on its private D-Bus socket. A local unprivileged user who
discovers the IBus socket address of another user could exploit this to
capture the key strokes of the other user.

Simon McVittie discovered that IBus did not enforce appropriate access
controls on its private D-Bus socket. A local unprivileged user who
discovers the IBus socket address of another user could exploit this to
capture the key strokes of the other user.

Update instructions

After a standard system update you need to reboot your computer to make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
19.04 disco ibus –  1.5.19-1ubuntu2.1
18.04 bionic ibus –  1.5.17-3ubuntu5.1
16.04 xenial ibus –  1.5.11-1ubuntu2.2

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›