Unchecked NULL pointer usage in resolve_keysym in xkbcomp/parser.y in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because a map access attempt can occur for a map that was never created.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2019:2079 | |
https://github.com/xkbcommon/libxkbcommon/commit/a8ea7a1d3daa7bdcb877615ae0a252c189153bd2 | Patch Third Party Advisory |
https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html | Mailing List Patch Third Party Advisory |
https://security.gentoo.org/glsa/201810-05 | Third Party Advisory |
https://usn.ubuntu.com/3786-1/ | Third Party Advisory |
https://usn.ubuntu.com/3786-2/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-08-25T21:00:00
Updated: 2019-08-06T16:06:20
Reserved: 2018-08-24T00:00:00
Link: CVE-2018-15864
JSON object: View
NVD Information
Status : Modified
Published: 2018-08-25T21:29:02.593
Modified: 2019-08-06T17:15:26.087
Link: CVE-2018-15864
JSON object: View
Redhat Information
No data.
CWE