Ubuntu 6589 Published by

The following updates has been released for Ubuntu Linux:

USN-4124-2: Exim vulnerability
USN-4134-1: IBus vulnerability



USN-4124-2: Exim vulnerability

=========================================================================
Ubuntu Security Notice USN-4124-2
September 16, 2019

exim4 vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 ESM

Summary:

Exim could be made to run programs as an administrator if it received
specially crafted network traffic.

Software Description:
- exim4: Exim is a mail transport agent

Details:

USN-4124-1 fixed a vulnerability in Exim. This update provides
the corresponding update for Ubuntu 14.04 ESM.

Original advisory details:

It was discovered that Exim incorrectly handled certain decoding
operations. A remote attacker could possibly use this issue to execute
arbitrary commands.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 ESM:
exim4-daemon-heavy 4.82-3ubuntu2.4+esm1
exim4-daemon-light 4.82-3ubuntu2.4+esm1

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4124-2
https://usn.ubuntu.com/4124-1
CVE-2019-15846

USN-4134-1: IBus vulnerability

=========================================================================
Ubuntu Security Notice USN-4134-1
September 16, 2019

ibus vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 19.04
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

IBus would allow local users to capture key strokes of other locally logged
in users.

Software Description:
- ibus: Intelligent Input Bus - core

Details:

Simon McVittie discovered that IBus did not enforce appropriate access
controls on its private D-Bus socket. A local unprivileged user who
discovers the IBus socket address of another user could exploit this to
capture the key strokes of the other user.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.04:
ibus 1.5.19-1ubuntu2.1

Ubuntu 18.04 LTS:
ibus 1.5.17-3ubuntu5.1

Ubuntu 16.04 LTS:
ibus 1.5.11-1ubuntu2.2

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
https://usn.ubuntu.com/4134-1
CVE-2019-14822

Package Information:
https://launchpad.net/ubuntu/+source/ibus/1.5.19-1ubuntu2.1
https://launchpad.net/ubuntu/+source/ibus/1.5.17-3ubuntu5.1
https://launchpad.net/ubuntu/+source/ibus/1.5.11-1ubuntu2.2