Synopsis
The remote Fedora host is missing a security update.
Description
- Resolves Bug 1054937 - Broken %defattr in ibus-chewing
- Fix Build for RHEL7
- Resolves Bug 1013977 - ibus-chewing needs to have ibus write-cache --system in %post and %postun
- Resolves Bug 1027031 - CVE-2013-4509 ibus-chewing:
ibus: visible password entry flaw [rhel-7.0]
- Resolves Bug 1028911 - [zh_TW]'Chinese<->English' switch does not work when clicking on the Chewing menu list.
- Resolves Bug 1045868 - ibus-chewing *again* not built with $RPM_OPT_FLAGS
- Option 'Sync between caps lock and IM': + Default of is changed to 'disable', because the previous default 'keyboard' cause bug 1028911 for GNOME Shell. + Now Sync from 'input method' can control Caps LED in GNOME shell.
- Translation added: de_DE, es_ES, it_IT, pt_BR, uk_UA
- Set environment IBUS_CHEWING_LOGFILE for ibus-chewing log.
- Resolves Bug 842856 - ibus-chewing 1.4.3-1 not built with $RPM_OPT_FLAGS
- Resolves Bug 1027030 - CVE-2013-4509 ibus-chewing:
ibus: visible password entry flaw [fedora-all] Thanks czchen for the GitHub pull request 39.
- Added translations: fr_FR, ja_JP, ko_KR
- Adopt cmake-fedora-1.2.0
- Resolves Bug 842856 - ibus-chewing 1.4.3-1 not built with $RPM_OPT_FLAGS
- Resolves Bug 1027030 - CVE-2013-4509 ibus-chewing:
ibus: visible password entry flaw [fedora-all] Thanks czchen for the GitHub pull request 39.
- Added translations: fr_FR, ja_JP, ko_KR
- Adopt cmake-fedora-1.2.0
- Resolves Bug 1013977 - ibus-chewing needs to have ibus write-cache --system in %post and %postun
- Resolves Bug 1027031 - CVE-2013-4509 ibus-chewing:
ibus: visible password entry flaw [rhel-7.0]
- Resolves Bug 1028911 - [zh_TW]'Chinese<->English' switch does not work when clicking on the Chewing menu list.
- Resolves Bug 1045868 - ibus-chewing *again* not built with $RPM_OPT_FLAGS
- Option 'Sync between caps lock and IM': + Default of is changed to 'disable', because the previous default 'keyboard' cause bug 1028911 for GNOME Shell. + Now Sync from 'input method' can control Caps LED in GNOME shell.
- Translation added: de_DE, es_ES, it_IT, pt_BR, uk_UA
- Set environment IBUS_CHEWING_LOGFILE for ibus-chewing log.
- Resolves Bug 842856 - ibus-chewing 1.4.3-1 not built with $RPM_OPT_FLAGS
- Resolves Bug 1027030 - CVE-2013-4509 ibus-chewing:
ibus: visible password entry flaw [fedora-all] Thanks czchen for the GitHub pull request 39.
- Added translations: fr_FR, ja_JP, ko_KR
- Adopt cmake-fedora-1.2.0
- Resolves Bug 842856 - ibus-chewing 1.4.3-1 not built with $RPM_OPT_FLAGS
- Resolves Bug 1027030 - CVE-2013-4509 ibus-chewing:
ibus: visible password entry flaw [fedora-all] Thanks czchen for the GitHub pull request 39.
- Added translations: fr_FR, ja_JP, ko_KR
- Adopt cmake-fedora-1.2.0
- Fix Build for RHEL7
- Resolves Bug 1013977 - ibus-chewing needs to have ibus write-cache --system in %post and %postun
- Resolves Bug 1027031 - CVE-2013-4509 ibus-chewing:
ibus: visible password entry flaw [rhel-7.0]
- Resolves Bug 1028911 - [zh_TW]'Chinese<->English' switch does not work when clicking on the Chewing menu list.
- Resolves Bug 1045868 - ibus-chewing *again* not built with $RPM_OPT_FLAGS
- Option 'Sync between caps lock and IM': + Default of is changed to 'disable', because the previous default 'keyboard' cause bug 1028911 for GNOME Shell. + Now Sync from 'input method' can control Caps LED in GNOME shell.
- Translation added: de_DE, es_ES, it_IT, pt_BR, uk_UA
- Set environment IBUS_CHEWING_LOGFILE for ibus-chewing log.
- Resolves Bug 842856 - ibus-chewing 1.4.3-1 not built with $RPM_OPT_FLAGS
- Resolves Bug 1027030 - CVE-2013-4509 ibus-chewing:
ibus: visible password entry flaw [fedora-all] Thanks czchen for the GitHub pull request 39.
- Added translations: fr_FR, ja_JP, ko_KR
- Adopt cmake-fedora-1.2.0
- Resolves Bug 842856 - ibus-chewing 1.4.3-1 not built with $RPM_OPT_FLAGS
- Resolves Bug 1027030 - CVE-2013-4509 ibus-chewing:
ibus: visible password entry flaw [fedora-all] Thanks czchen for the GitHub pull request 39.
- Added translations: fr_FR, ja_JP, ko_KR
- Adopt cmake-fedora-1.2.0
- Resolves Bug 1013977 - ibus-chewing needs to have ibus write-cache --system in %post and %postun
- Resolves Bug 1027031 - CVE-2013-4509 ibus-chewing:
ibus: visible password entry flaw [rhel-7.0]
- Resolves Bug 1028911 - [zh_TW]'Chinese<->English' switch does not work when clicking on the Chewing menu list.
- Resolves Bug 1045868 - ibus-chewing *again* not built with $RPM_OPT_FLAGS
- Option 'Sync between caps lock and IM': + Default of is changed to 'disable', because the previous default 'keyboard' cause bug 1028911 for GNOME Shell. + Now Sync from 'input method' can control Caps LED in GNOME shell.
- Translation added: de_DE, es_ES, it_IT, pt_BR, uk_UA
- Set environment IBUS_CHEWING_LOGFILE for ibus-chewing log.
- Resolves Bug 842856 - ibus-chewing 1.4.3-1 not built with $RPM_OPT_FLAGS
- Resolves Bug 1027030 - CVE-2013-4509 ibus-chewing:
ibus: visible password entry flaw [fedora-all] Thanks czchen for the GitHub pull request 39.
- Added translations: fr_FR, ja_JP, ko_KR
- Adopt cmake-fedora-1.2.0
- Resolves Bug 842856 - ibus-chewing 1.4.3-1 not built with $RPM_OPT_FLAGS
- Resolves Bug 1027030 - CVE-2013-4509 ibus-chewing:
ibus: visible password entry flaw [fedora-all] Thanks czchen for the GitHub pull request 39.
- Added translations: fr_FR, ja_JP, ko_KR
- Adopt cmake-fedora-1.2.0
Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected ibus-chewing package.
Plugin Details
File Name: fedora_2014-1910.nasl
Agent: unix
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus
Risk Information
Vector: CVSS2#AV:L/AC:M/Au:N/C:P/I:N/A:N
Vulnerability Information
CPE: p-cpe:/a:fedoraproject:fedora:ibus-chewing, cpe:/o:fedoraproject:fedora:19
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 2/3/2014
Vulnerability Publication Date: 11/23/2013