Unchecked NULL pointer usage in xkbcommon before 0.8.1 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because geometry tokens were desupported incorrectly.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2019:2079 | |
https://github.com/xkbcommon/libxkbcommon/commit/e3cacae7b1bfda0d839c280494f23284a1187adf | Patch Third Party Advisory |
https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html | Third Party Advisory |
https://security.gentoo.org/glsa/201810-05 | Third Party Advisory |
https://usn.ubuntu.com/3786-1/ | Third Party Advisory |
https://usn.ubuntu.com/3786-2/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-08-25T21:00:00
Updated: 2019-08-06T16:06:21
Reserved: 2018-08-24T00:00:00
Link: CVE-2018-15854
JSON object: View
NVD Information
Status : Modified
Published: 2018-08-25T21:29:01.593
Modified: 2019-08-06T17:15:24.947
Link: CVE-2018-15854
JSON object: View
Redhat Information
No data.
CWE