公告ID: KYLIN-2019-14822
安全等级: 中等
产品: Kylin V3
发布日期: 2019年9月13日
CVE: CVE-2019-14822
CVSS3评分: 6.1
概述:
Gnome uses the ibus input framework only when the user explicitly configures it or when some input method sources are in use, like Korean from the ibus-hangul package or Chinese input methods from the ibus-libpinyin. Input methods like en-US are not handled by ibus, thus if the victim user just use them the attacker will not be able to intercept the key strokes of that user. Kylin Enterprise Linux 6: This vulnerability has been rated as having a security impact of Moderate. After evaluation and in accordance with the criteria noted in the product support life cycle, there are no plans to address this issue in an upcoming release. Please contact Kylin Support for further information. Kylin Enterprise Linux 7: This vulnerability is currently targeted to be addressed in an upcoming release. Kylin Enterprise Linux 8: This vulnerability is currently targeted to be addressed in an upcoming release. 描述:
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. A flaw was discovered in ibus that allows any unprivileged user to monitor and send method calls to the ibus bus of another user due to a misconfiguration in the DBus server setup. A local attacker may use this flaw to intercept all keystrokes of a victim user who is using the graphical interface, change the input method engine, or modify other input related configurations of the victim user. 系统版本:
KYLIN 3.2.x
KYLIN 3.3.x
KYLIN 3.4.x
受影响包列表:
ibus
ibus
ibus