Action not permitted
Modal body text goes here.
Modal Title
Modal Body
wid-sec-w-2024-0021
Vulnerability from csaf_certbund
Published
2019-08-06 22:00
Modified
2024-01-07 23:00
Summary
X.Org X11: Mehrere Schwachstellen ermöglichen Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das X Window System dient der Erzeugung grafischer Oberflächen auf Unix Systemen.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in X.Org ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- UNIX
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Das X Window System dient der Erzeugung grafischer Oberfl\u00e4chen auf Unix Systemen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in X.Org ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0021 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2024-0021.json" }, { "category": "self", "summary": "WID-SEC-2024-0021 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0021" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2079 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2079" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2019:2079 vom 2020-02-06", "url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-2079-Moderate-CentOS-7-xorg-x11-drv-ati-Security-Update-tp4645838.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0037-1 vom 2024-01-05", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017591.html" } ], "source_lang": "en-US", "title": "X.Org X11: Mehrere Schwachstellen erm\u00f6glichen Denial of Service", "tracking": { "current_release_date": "2024-01-07T23:00:00.000+00:00", "generator": { "date": "2024-08-15T18:03:19.787+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-0021", "initial_release_date": "2019-08-06T22:00:00.000+00:00", "revision_history": [ { "date": "2019-08-06T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2019-08-07T22:00:00.000+00:00", "number": "2", "summary": "Korrektur: Angriff nur lokal bzgl. gemeldeter CVE" }, { "date": "2020-02-05T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von CentOS aufgenommen" }, { "date": "2024-01-07T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Open Source CentOS", "product": { "name": "Open Source CentOS", "product_id": "1727", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:-" } } }, { "category": "product_name", "name": "Open Source X.Org X11", "product": { "name": "Open Source X.Org X11", "product_id": "T001034", "product_identification_helper": { "cpe": "cpe:/a:x:x.org_x11:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux 7", "product": { "name": "Red Hat Enterprise Linux 7", "product_id": "T006054", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-15853", "notes": [ { "category": "description", "text": "In X.Org existieren mehrere Schwachstellen aufgrund von Endlosschleifen, NULL-Zeiger Dereferenzierungen und anderer Speichernutzungsprobleme. Ein Angreifer kann diese Probleme ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T001034", "1727", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-15853" }, { "cve": "CVE-2018-15854", "notes": [ { "category": "description", "text": "In X.Org existieren mehrere Schwachstellen aufgrund von Endlosschleifen, NULL-Zeiger Dereferenzierungen und anderer Speichernutzungsprobleme. Ein Angreifer kann diese Probleme ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T001034", "1727", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-15854" }, { "cve": "CVE-2018-15855", "notes": [ { "category": "description", "text": "In X.Org existieren mehrere Schwachstellen aufgrund von Endlosschleifen, NULL-Zeiger Dereferenzierungen und anderer Speichernutzungsprobleme. Ein Angreifer kann diese Probleme ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T001034", "1727", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-15855" }, { "cve": "CVE-2018-15856", "notes": [ { "category": "description", "text": "In X.Org existieren mehrere Schwachstellen aufgrund von Endlosschleifen, NULL-Zeiger Dereferenzierungen und anderer Speichernutzungsprobleme. Ein Angreifer kann diese Probleme ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T001034", "1727", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-15856" }, { "cve": "CVE-2018-15857", "notes": [ { "category": "description", "text": "In X.Org existieren mehrere Schwachstellen aufgrund von Endlosschleifen, NULL-Zeiger Dereferenzierungen und anderer Speichernutzungsprobleme. Ein Angreifer kann diese Probleme ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T001034", "1727", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-15857" }, { "cve": "CVE-2018-15859", "notes": [ { "category": "description", "text": "In X.Org existieren mehrere Schwachstellen aufgrund von Endlosschleifen, NULL-Zeiger Dereferenzierungen und anderer Speichernutzungsprobleme. Ein Angreifer kann diese Probleme ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T001034", "1727", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-15859" }, { "cve": "CVE-2018-15861", "notes": [ { "category": "description", "text": "In X.Org existieren mehrere Schwachstellen aufgrund von Endlosschleifen, NULL-Zeiger Dereferenzierungen und anderer Speichernutzungsprobleme. Ein Angreifer kann diese Probleme ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T001034", "1727", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-15861" }, { "cve": "CVE-2018-15862", "notes": [ { "category": "description", "text": "In X.Org existieren mehrere Schwachstellen aufgrund von Endlosschleifen, NULL-Zeiger Dereferenzierungen und anderer Speichernutzungsprobleme. Ein Angreifer kann diese Probleme ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T001034", "1727", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-15862" }, { "cve": "CVE-2018-15863", "notes": [ { "category": "description", "text": "In X.Org existieren mehrere Schwachstellen aufgrund von Endlosschleifen, NULL-Zeiger Dereferenzierungen und anderer Speichernutzungsprobleme. Ein Angreifer kann diese Probleme ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T001034", "1727", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-15863" }, { "cve": "CVE-2018-15864", "notes": [ { "category": "description", "text": "In X.Org existieren mehrere Schwachstellen aufgrund von Endlosschleifen, NULL-Zeiger Dereferenzierungen und anderer Speichernutzungsprobleme. Ein Angreifer kann diese Probleme ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T001034", "1727", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-15864" } ] }
cve-2018-15862
Vulnerability from cvelistv5
Published
2018-08-25 21:00
Modified
2024-08-05 10:10
Severity ?
EPSS score ?
Summary
Unchecked NULL pointer usage in LookupModMask in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file with invalid virtual modifiers.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201810-05 | vendor-advisory, x_refsource_GENTOO | |
https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html | x_refsource_MISC | |
https://usn.ubuntu.com/3786-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://github.com/xkbcommon/libxkbcommon/commit/4e2ee9c3f6050d773f8bbe05bc0edb17f1ff8371 | x_refsource_MISC | |
https://usn.ubuntu.com/3786-2/ | vendor-advisory, x_refsource_UBUNTU | |
https://access.redhat.com/errata/RHSA-2019:2079 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:10:04.954Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201810-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-05" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html" }, { "name": "USN-3786-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3786-1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/xkbcommon/libxkbcommon/commit/4e2ee9c3f6050d773f8bbe05bc0edb17f1ff8371" }, { "name": "USN-3786-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3786-2/" }, { "name": "RHSA-2019:2079", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-08-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Unchecked NULL pointer usage in LookupModMask in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file with invalid virtual modifiers." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-06T16:06:20", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201810-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-05" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html" }, { "name": "USN-3786-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3786-1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/xkbcommon/libxkbcommon/commit/4e2ee9c3f6050d773f8bbe05bc0edb17f1ff8371" }, { "name": "USN-3786-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3786-2/" }, { "name": "RHSA-2019:2079", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-15862", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unchecked NULL pointer usage in LookupModMask in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file with invalid virtual modifiers." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201810-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-05" }, { "name": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html", "refsource": "MISC", "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html" }, { "name": "USN-3786-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3786-1/" }, { "name": "https://github.com/xkbcommon/libxkbcommon/commit/4e2ee9c3f6050d773f8bbe05bc0edb17f1ff8371", "refsource": "MISC", "url": "https://github.com/xkbcommon/libxkbcommon/commit/4e2ee9c3f6050d773f8bbe05bc0edb17f1ff8371" }, { "name": "USN-3786-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3786-2/" }, { "name": "RHSA-2019:2079", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-15862", "datePublished": "2018-08-25T21:00:00", "dateReserved": "2018-08-24T00:00:00", "dateUpdated": "2024-08-05T10:10:04.954Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-15855
Vulnerability from cvelistv5
Published
2018-08-25 21:00
Modified
2024-08-05 10:10
Severity ?
EPSS score ?
Summary
Unchecked NULL pointer usage in xkbcommon before 0.8.1 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because the XkbFile for an xkb_geometry section was mishandled.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201810-05 | vendor-advisory, x_refsource_GENTOO | |
https://usn.ubuntu.com/3786-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://usn.ubuntu.com/3786-2/ | vendor-advisory, x_refsource_UBUNTU | |
https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html | x_refsource_MISC | |
https://github.com/xkbcommon/libxkbcommon/commit/917636b1d0d70205a13f89062b95e3a0fc31d4ff | x_refsource_MISC | |
https://access.redhat.com/errata/RHSA-2019:2079 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:10:04.916Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201810-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-05" }, { "name": "USN-3786-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3786-1/" }, { "name": "USN-3786-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3786-2/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/xkbcommon/libxkbcommon/commit/917636b1d0d70205a13f89062b95e3a0fc31d4ff" }, { "name": "RHSA-2019:2079", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-08-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Unchecked NULL pointer usage in xkbcommon before 0.8.1 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because the XkbFile for an xkb_geometry section was mishandled." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-06T16:06:20", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201810-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-05" }, { "name": "USN-3786-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3786-1/" }, { "name": "USN-3786-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3786-2/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/xkbcommon/libxkbcommon/commit/917636b1d0d70205a13f89062b95e3a0fc31d4ff" }, { "name": "RHSA-2019:2079", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-15855", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unchecked NULL pointer usage in xkbcommon before 0.8.1 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because the XkbFile for an xkb_geometry section was mishandled." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201810-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-05" }, { "name": "USN-3786-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3786-1/" }, { "name": "USN-3786-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3786-2/" }, { "name": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html", "refsource": "MISC", "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html" }, { "name": "https://github.com/xkbcommon/libxkbcommon/commit/917636b1d0d70205a13f89062b95e3a0fc31d4ff", "refsource": "MISC", "url": "https://github.com/xkbcommon/libxkbcommon/commit/917636b1d0d70205a13f89062b95e3a0fc31d4ff" }, { "name": "RHSA-2019:2079", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-15855", "datePublished": "2018-08-25T21:00:00", "dateReserved": "2018-08-24T00:00:00", "dateUpdated": "2024-08-05T10:10:04.916Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-15861
Vulnerability from cvelistv5
Published
2018-08-25 21:00
Modified
2024-08-05 10:10
Severity ?
EPSS score ?
Summary
Unchecked NULL pointer usage in ExprResolveLhs in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file that triggers an xkb_intern_atom failure.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201810-05 | vendor-advisory, x_refsource_GENTOO | |
https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html | x_refsource_MISC | |
https://usn.ubuntu.com/3786-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://github.com/xkbcommon/libxkbcommon/commit/38e1766bc6e20108948aec8a0b222a4bad0254e9 | x_refsource_MISC | |
https://usn.ubuntu.com/3786-2/ | vendor-advisory, x_refsource_UBUNTU | |
https://access.redhat.com/errata/RHSA-2019:2079 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:10:04.497Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201810-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-05" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html" }, { "name": "USN-3786-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3786-1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/xkbcommon/libxkbcommon/commit/38e1766bc6e20108948aec8a0b222a4bad0254e9" }, { "name": "USN-3786-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3786-2/" }, { "name": "RHSA-2019:2079", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-08-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Unchecked NULL pointer usage in ExprResolveLhs in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file that triggers an xkb_intern_atom failure." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-06T16:06:20", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201810-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-05" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html" }, { "name": "USN-3786-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3786-1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/xkbcommon/libxkbcommon/commit/38e1766bc6e20108948aec8a0b222a4bad0254e9" }, { "name": "USN-3786-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3786-2/" }, { "name": "RHSA-2019:2079", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-15861", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unchecked NULL pointer usage in ExprResolveLhs in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file that triggers an xkb_intern_atom failure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201810-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-05" }, { "name": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html", "refsource": "MISC", "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html" }, { "name": "USN-3786-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3786-1/" }, { "name": "https://github.com/xkbcommon/libxkbcommon/commit/38e1766bc6e20108948aec8a0b222a4bad0254e9", "refsource": "MISC", "url": "https://github.com/xkbcommon/libxkbcommon/commit/38e1766bc6e20108948aec8a0b222a4bad0254e9" }, { "name": "USN-3786-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3786-2/" }, { "name": "RHSA-2019:2079", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-15861", "datePublished": "2018-08-25T21:00:00", "dateReserved": "2018-08-24T00:00:00", "dateUpdated": "2024-08-05T10:10:04.497Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-15859
Vulnerability from cvelistv5
Published
2018-08-25 21:00
Modified
2024-08-05 10:10
Severity ?
EPSS score ?
Summary
Unchecked NULL pointer usage when parsing invalid atoms in ExprResolveLhs in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because lookup failures are mishandled.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201810-05 | vendor-advisory, x_refsource_GENTOO | |
https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html | x_refsource_MISC | |
https://usn.ubuntu.com/3786-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://github.com/xkbcommon/libxkbcommon/commit/bb4909d2d8fa6b08155e449986a478101e2b2634 | x_refsource_MISC | |
https://usn.ubuntu.com/3786-2/ | vendor-advisory, x_refsource_UBUNTU | |
https://access.redhat.com/errata/RHSA-2019:2079 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:10:05.372Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201810-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-05" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html" }, { "name": "USN-3786-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3786-1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/xkbcommon/libxkbcommon/commit/bb4909d2d8fa6b08155e449986a478101e2b2634" }, { "name": "USN-3786-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3786-2/" }, { "name": "RHSA-2019:2079", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-08-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Unchecked NULL pointer usage when parsing invalid atoms in ExprResolveLhs in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because lookup failures are mishandled." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-06T16:06:20", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201810-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-05" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html" }, { "name": "USN-3786-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3786-1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/xkbcommon/libxkbcommon/commit/bb4909d2d8fa6b08155e449986a478101e2b2634" }, { "name": "USN-3786-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3786-2/" }, { "name": "RHSA-2019:2079", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-15859", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unchecked NULL pointer usage when parsing invalid atoms in ExprResolveLhs in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because lookup failures are mishandled." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201810-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-05" }, { "name": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html", "refsource": "MISC", "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html" }, { "name": "USN-3786-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3786-1/" }, { "name": "https://github.com/xkbcommon/libxkbcommon/commit/bb4909d2d8fa6b08155e449986a478101e2b2634", "refsource": "MISC", "url": "https://github.com/xkbcommon/libxkbcommon/commit/bb4909d2d8fa6b08155e449986a478101e2b2634" }, { "name": "USN-3786-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3786-2/" }, { "name": "RHSA-2019:2079", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-15859", "datePublished": "2018-08-25T21:00:00", "dateReserved": "2018-08-24T00:00:00", "dateUpdated": "2024-08-05T10:10:05.372Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-15863
Vulnerability from cvelistv5
Published
2018-08-25 21:00
Modified
2024-08-05 10:10
Severity ?
EPSS score ?
Summary
Unchecked NULL pointer usage in ResolveStateAndPredicate in xkbcomp/compat.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file with a no-op modmask expression.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201810-05 | vendor-advisory, x_refsource_GENTOO | |
https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html | x_refsource_MISC | |
https://github.com/xkbcommon/libxkbcommon/commit/96df3106d49438e442510c59acad306e94f3db4d | x_refsource_MISC | |
https://usn.ubuntu.com/3786-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://usn.ubuntu.com/3786-2/ | vendor-advisory, x_refsource_UBUNTU | |
https://access.redhat.com/errata/RHSA-2019:2079 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:10:04.783Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201810-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-05" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/xkbcommon/libxkbcommon/commit/96df3106d49438e442510c59acad306e94f3db4d" }, { "name": "USN-3786-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3786-1/" }, { "name": "USN-3786-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3786-2/" }, { "name": "RHSA-2019:2079", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-08-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Unchecked NULL pointer usage in ResolveStateAndPredicate in xkbcomp/compat.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file with a no-op modmask expression." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-06T16:06:20", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201810-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-05" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/xkbcommon/libxkbcommon/commit/96df3106d49438e442510c59acad306e94f3db4d" }, { "name": "USN-3786-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3786-1/" }, { "name": "USN-3786-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3786-2/" }, { "name": "RHSA-2019:2079", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-15863", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unchecked NULL pointer usage in ResolveStateAndPredicate in xkbcomp/compat.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file with a no-op modmask expression." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201810-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-05" }, { "name": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html", "refsource": "MISC", "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html" }, { "name": "https://github.com/xkbcommon/libxkbcommon/commit/96df3106d49438e442510c59acad306e94f3db4d", "refsource": "MISC", "url": "https://github.com/xkbcommon/libxkbcommon/commit/96df3106d49438e442510c59acad306e94f3db4d" }, { "name": "USN-3786-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3786-1/" }, { "name": "USN-3786-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3786-2/" }, { "name": "RHSA-2019:2079", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-15863", "datePublished": "2018-08-25T21:00:00", "dateReserved": "2018-08-24T00:00:00", "dateUpdated": "2024-08-05T10:10:04.783Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-15864
Vulnerability from cvelistv5
Published
2018-08-25 21:00
Modified
2024-08-05 10:10
Severity ?
EPSS score ?
Summary
Unchecked NULL pointer usage in resolve_keysym in xkbcomp/parser.y in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because a map access attempt can occur for a map that was never created.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201810-05 | vendor-advisory, x_refsource_GENTOO | |
https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html | x_refsource_MISC | |
https://github.com/xkbcommon/libxkbcommon/commit/a8ea7a1d3daa7bdcb877615ae0a252c189153bd2 | x_refsource_MISC | |
https://usn.ubuntu.com/3786-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://usn.ubuntu.com/3786-2/ | vendor-advisory, x_refsource_UBUNTU | |
https://access.redhat.com/errata/RHSA-2019:2079 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:10:04.901Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201810-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-05" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/xkbcommon/libxkbcommon/commit/a8ea7a1d3daa7bdcb877615ae0a252c189153bd2" }, { "name": "USN-3786-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3786-1/" }, { "name": "USN-3786-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3786-2/" }, { "name": "RHSA-2019:2079", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-08-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Unchecked NULL pointer usage in resolve_keysym in xkbcomp/parser.y in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because a map access attempt can occur for a map that was never created." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-06T16:06:20", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201810-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-05" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/xkbcommon/libxkbcommon/commit/a8ea7a1d3daa7bdcb877615ae0a252c189153bd2" }, { "name": "USN-3786-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3786-1/" }, { "name": "USN-3786-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3786-2/" }, { "name": "RHSA-2019:2079", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-15864", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unchecked NULL pointer usage in resolve_keysym in xkbcomp/parser.y in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because a map access attempt can occur for a map that was never created." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201810-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-05" }, { "name": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html", "refsource": "MISC", "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html" }, { "name": "https://github.com/xkbcommon/libxkbcommon/commit/a8ea7a1d3daa7bdcb877615ae0a252c189153bd2", "refsource": "MISC", "url": "https://github.com/xkbcommon/libxkbcommon/commit/a8ea7a1d3daa7bdcb877615ae0a252c189153bd2" }, { "name": "USN-3786-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3786-1/" }, { "name": "USN-3786-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3786-2/" }, { "name": "RHSA-2019:2079", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-15864", "datePublished": "2018-08-25T21:00:00", "dateReserved": "2018-08-24T00:00:00", "dateUpdated": "2024-08-05T10:10:04.901Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-15853
Vulnerability from cvelistv5
Published
2018-08-25 21:00
Modified
2024-08-05 10:10
Severity ?
EPSS score ?
Summary
Endless recursion exists in xkbcomp/expr.c in xkbcommon and libxkbcommon before 0.8.1, which could be used by local attackers to crash xkbcommon users by supplying a crafted keymap file that triggers boolean negation.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201810-05 | vendor-advisory, x_refsource_GENTOO | |
https://usn.ubuntu.com/3786-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://usn.ubuntu.com/3786-2/ | vendor-advisory, x_refsource_UBUNTU | |
https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html | x_refsource_MISC | |
https://github.com/xkbcommon/libxkbcommon/commit/1f9d1248c07cda8aaff762429c0dce146de8632a | x_refsource_MISC | |
https://access.redhat.com/errata/RHSA-2019:2079 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:10:04.991Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201810-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-05" }, { "name": "USN-3786-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3786-1/" }, { "name": "USN-3786-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3786-2/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/xkbcommon/libxkbcommon/commit/1f9d1248c07cda8aaff762429c0dce146de8632a" }, { "name": "RHSA-2019:2079", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-08-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Endless recursion exists in xkbcomp/expr.c in xkbcommon and libxkbcommon before 0.8.1, which could be used by local attackers to crash xkbcommon users by supplying a crafted keymap file that triggers boolean negation." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-06T16:06:20", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201810-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-05" }, { "name": "USN-3786-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3786-1/" }, { "name": "USN-3786-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3786-2/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/xkbcommon/libxkbcommon/commit/1f9d1248c07cda8aaff762429c0dce146de8632a" }, { "name": "RHSA-2019:2079", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-15853", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Endless recursion exists in xkbcomp/expr.c in xkbcommon and libxkbcommon before 0.8.1, which could be used by local attackers to crash xkbcommon users by supplying a crafted keymap file that triggers boolean negation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201810-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-05" }, { "name": "USN-3786-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3786-1/" }, { "name": "USN-3786-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3786-2/" }, { "name": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html", "refsource": "MISC", "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html" }, { "name": "https://github.com/xkbcommon/libxkbcommon/commit/1f9d1248c07cda8aaff762429c0dce146de8632a", "refsource": "MISC", "url": "https://github.com/xkbcommon/libxkbcommon/commit/1f9d1248c07cda8aaff762429c0dce146de8632a" }, { "name": "RHSA-2019:2079", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-15853", "datePublished": "2018-08-25T21:00:00", "dateReserved": "2018-08-24T00:00:00", "dateUpdated": "2024-08-05T10:10:04.991Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-15856
Vulnerability from cvelistv5
Published
2018-08-25 21:00
Modified
2024-08-05 10:10
Severity ?
EPSS score ?
Summary
An infinite loop when reaching EOL unexpectedly in compose/parser.c (aka the keymap parser) in xkbcommon before 0.8.1 could be used by local attackers to cause a denial of service during parsing of crafted keymap files.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201810-05 | vendor-advisory, x_refsource_GENTOO | |
https://github.com/xkbcommon/libxkbcommon/commit/842e4351c2c97de6051cab6ce36b4a81e709a0e1 | x_refsource_MISC | |
https://usn.ubuntu.com/3786-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://usn.ubuntu.com/3786-2/ | vendor-advisory, x_refsource_UBUNTU | |
https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html | x_refsource_MISC | |
https://access.redhat.com/errata/RHSA-2019:2079 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:10:04.568Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201810-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-05" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/xkbcommon/libxkbcommon/commit/842e4351c2c97de6051cab6ce36b4a81e709a0e1" }, { "name": "USN-3786-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3786-1/" }, { "name": "USN-3786-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3786-2/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html" }, { "name": "RHSA-2019:2079", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-08-25T00:00:00", "descriptions": [ { "lang": "en", "value": "An infinite loop when reaching EOL unexpectedly in compose/parser.c (aka the keymap parser) in xkbcommon before 0.8.1 could be used by local attackers to cause a denial of service during parsing of crafted keymap files." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-06T16:06:20", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201810-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-05" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/xkbcommon/libxkbcommon/commit/842e4351c2c97de6051cab6ce36b4a81e709a0e1" }, { "name": "USN-3786-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3786-1/" }, { "name": "USN-3786-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3786-2/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html" }, { "name": "RHSA-2019:2079", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-15856", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An infinite loop when reaching EOL unexpectedly in compose/parser.c (aka the keymap parser) in xkbcommon before 0.8.1 could be used by local attackers to cause a denial of service during parsing of crafted keymap files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201810-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-05" }, { "name": "https://github.com/xkbcommon/libxkbcommon/commit/842e4351c2c97de6051cab6ce36b4a81e709a0e1", "refsource": "MISC", "url": "https://github.com/xkbcommon/libxkbcommon/commit/842e4351c2c97de6051cab6ce36b4a81e709a0e1" }, { "name": "USN-3786-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3786-1/" }, { "name": "USN-3786-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3786-2/" }, { "name": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html", "refsource": "MISC", "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html" }, { "name": "RHSA-2019:2079", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-15856", "datePublished": "2018-08-25T21:00:00", "dateReserved": "2018-08-24T00:00:00", "dateUpdated": "2024-08-05T10:10:04.568Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-15857
Vulnerability from cvelistv5
Published
2018-08-25 21:00
Modified
2024-08-05 10:10
Severity ?
EPSS score ?
Summary
An invalid free in ExprAppendMultiKeysymList in xkbcomp/ast-build.c in xkbcommon before 0.8.1 could be used by local attackers to crash xkbcommon keymap parsers or possibly have unspecified other impact by supplying a crafted keymap file.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201810-05 | vendor-advisory, x_refsource_GENTOO | |
https://usn.ubuntu.com/3786-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://github.com/xkbcommon/libxkbcommon/commit/c1e5ac16e77a21f87bdf3bc4dea61b037a17dddb | x_refsource_MISC | |
https://usn.ubuntu.com/3786-2/ | vendor-advisory, x_refsource_UBUNTU | |
https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html | x_refsource_MISC | |
https://access.redhat.com/errata/RHSA-2019:2079 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:10:04.755Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201810-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-05" }, { "name": "USN-3786-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3786-1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/xkbcommon/libxkbcommon/commit/c1e5ac16e77a21f87bdf3bc4dea61b037a17dddb" }, { "name": "USN-3786-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3786-2/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html" }, { "name": "RHSA-2019:2079", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-08-25T00:00:00", "descriptions": [ { "lang": "en", "value": "An invalid free in ExprAppendMultiKeysymList in xkbcomp/ast-build.c in xkbcommon before 0.8.1 could be used by local attackers to crash xkbcommon keymap parsers or possibly have unspecified other impact by supplying a crafted keymap file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-06T16:06:20", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201810-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-05" }, { "name": "USN-3786-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3786-1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/xkbcommon/libxkbcommon/commit/c1e5ac16e77a21f87bdf3bc4dea61b037a17dddb" }, { "name": "USN-3786-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3786-2/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html" }, { "name": "RHSA-2019:2079", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-15857", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An invalid free in ExprAppendMultiKeysymList in xkbcomp/ast-build.c in xkbcommon before 0.8.1 could be used by local attackers to crash xkbcommon keymap parsers or possibly have unspecified other impact by supplying a crafted keymap file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201810-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-05" }, { "name": "USN-3786-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3786-1/" }, { "name": "https://github.com/xkbcommon/libxkbcommon/commit/c1e5ac16e77a21f87bdf3bc4dea61b037a17dddb", "refsource": "MISC", "url": "https://github.com/xkbcommon/libxkbcommon/commit/c1e5ac16e77a21f87bdf3bc4dea61b037a17dddb" }, { "name": "USN-3786-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3786-2/" }, { "name": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html", "refsource": "MISC", "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html" }, { "name": "RHSA-2019:2079", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-15857", "datePublished": "2018-08-25T21:00:00", "dateReserved": "2018-08-24T00:00:00", "dateUpdated": "2024-08-05T10:10:04.755Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-15854
Vulnerability from cvelistv5
Published
2018-08-25 21:00
Modified
2024-08-05 10:10
Severity ?
EPSS score ?
Summary
Unchecked NULL pointer usage in xkbcommon before 0.8.1 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because geometry tokens were desupported incorrectly.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201810-05 | vendor-advisory, x_refsource_GENTOO | |
https://github.com/xkbcommon/libxkbcommon/commit/e3cacae7b1bfda0d839c280494f23284a1187adf | x_refsource_MISC | |
https://usn.ubuntu.com/3786-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://usn.ubuntu.com/3786-2/ | vendor-advisory, x_refsource_UBUNTU | |
https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html | x_refsource_MISC | |
https://access.redhat.com/errata/RHSA-2019:2079 | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:10:04.683Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201810-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-05" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/xkbcommon/libxkbcommon/commit/e3cacae7b1bfda0d839c280494f23284a1187adf" }, { "name": "USN-3786-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3786-1/" }, { "name": "USN-3786-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3786-2/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html" }, { "name": "RHSA-2019:2079", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-08-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Unchecked NULL pointer usage in xkbcommon before 0.8.1 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because geometry tokens were desupported incorrectly." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-06T16:06:21", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201810-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-05" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/xkbcommon/libxkbcommon/commit/e3cacae7b1bfda0d839c280494f23284a1187adf" }, { "name": "USN-3786-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3786-1/" }, { "name": "USN-3786-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3786-2/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html" }, { "name": "RHSA-2019:2079", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-15854", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unchecked NULL pointer usage in xkbcommon before 0.8.1 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because geometry tokens were desupported incorrectly." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201810-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-05" }, { "name": "https://github.com/xkbcommon/libxkbcommon/commit/e3cacae7b1bfda0d839c280494f23284a1187adf", "refsource": "MISC", "url": "https://github.com/xkbcommon/libxkbcommon/commit/e3cacae7b1bfda0d839c280494f23284a1187adf" }, { "name": "USN-3786-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3786-1/" }, { "name": "USN-3786-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3786-2/" }, { "name": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html", "refsource": "MISC", "url": "https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html" }, { "name": "RHSA-2019:2079", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2079" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-15854", "datePublished": "2018-08-25T21:00:00", "dateReserved": "2018-08-24T00:00:00", "dateUpdated": "2024-08-05T10:10:04.683Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.