{"id":"SUSE-SU-2018:3685-1","summary":"Security update for libxkbcommon","details":"This update for libxkbcommon to version 0.8.2 fixes the following issues:\n\n- Fix a few NULL-dereferences, out-of-bounds access and undefined behavior in\n  the XKB text format parser.\n- CVE-2018-15853: Endless recursion could have been used by local attackers to\n  crash xkbcommon users by supplying a crafted keymap file that triggers boolean\n  negation (bsc#1105832).\n- CVE-2018-15854: Unchecked NULL pointer usage could have been used by local\n  attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying\n  a crafted keymap file, because geometry tokens were desupported incorrectly\n  (bsc#1105832).\n- CVE-2018-15855: Unchecked NULL pointer usage could have been used by local\n  attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying\n  a crafted keymap file, because the XkbFile for an xkb_geometry section was\n  mishandled (bsc#1105832).\n- CVE-2018-15856: An infinite loop when reaching EOL unexpectedly could be used\n  by local attackers to cause a denial of service during parsing of crafted\n  keymap files (bsc#1105832).\n- CVE-2018-15857: An invalid free in ExprAppendMultiKeysymList could have been\n  used by local attackers to crash xkbcommon keymap parsers or possibly have\n  unspecified other impact by supplying a crafted keymap file (bsc#1105832).\n- CVE-2018-15858: Unchecked NULL pointer usage when handling invalid aliases in\n  CopyKeyAliasesToKeymap could have been used by local attackers to crash (NULL\n  pointer dereference) the xkbcommon parser by supplying a crafted keymap file\n  (bsc#1105832).\n- CVE-2018-15859: Unchecked NULL pointer usage when parsing invalid atoms in\n  ExprResolveLhs could have been used by local attackers to crash (NULL pointer\n  dereference) the xkbcommon parser by supplying a crafted keymap file, because\n  lookup failures are mishandled (bsc#1105832).\n- CVE-2018-15861: Unchecked NULL pointer usage in ExprResolveLhs could have\n  been used by local attackers to crash (NULL pointer dereference) the xkbcommon\n  parser by supplying a crafted keymap file that triggers an xkb_intern_atom\n  failure (bsc#1105832).\n- CVE-2018-15862: Unchecked NULL pointer usage in LookupModMask could have been\n  used by local attackers to crash (NULL pointer dereference) the xkbcommon\n  parser by supplying a crafted keymap file with invalid virtual modifiers\n  (bsc#1105832).\n- CVE-2018-15863: Unchecked NULL pointer usage in ResolveStateAndPredicate\n  could have been used by local attackers to crash (NULL pointer dereference) the\n  xkbcommon parser by supplying a crafted keymap file with a no-op modmask\n  expression (bsc#1105832).\n- CVE-2018-15864: Unchecked NULL pointer usage in resolve_keysym could have\n  been used by local attackers to crash (NULL pointer dereference) the xkbcommon\n  parser by supplying a crafted keymap file, because a map access attempt can\n  occur for a map that was never created (bsc#1105832).\n","modified":"2026-02-04T04:21:13.356493Z","published":"2018-11-08T16:57:36Z","related":["CVE-2018-15853","CVE-2018-15854","CVE-2018-15855","CVE-2018-15856","CVE-2018-15857","CVE-2018-15858","CVE-2018-15859","CVE-2018-15861","CVE-2018-15862","CVE-2018-15863","CVE-2018-15864"],"upstream":["CVE-2018-15853","CVE-2018-15854","CVE-2018-15855","CVE-2018-15856","CVE-2018-15857","CVE-2018-15858","CVE-2018-15859","CVE-2018-15861","CVE-2018-15862","CVE-2018-15863","CVE-2018-15864"],"references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20183685-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1105832"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-15853"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-15854"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-15855"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-15856"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-15857"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-15858"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-15859"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-15861"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-15862"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-15863"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-15864"}],"affected":[{"package":{"name":"libxkbcommon","ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15","purl":"pkg:rpm/suse/libxkbcommon&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.8.2-3.3.1"}]}],"ecosystem_specific":{"binaries":[{"libxkbcommon-devel":"0.8.2-3.3.1","libxkbcommon-x11-devel":"0.8.2-3.3.1","libxkbcommon0":"0.8.2-3.3.1","libxkbcommon-x11-0":"0.8.2-3.3.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2018:3685-1.json"}}],"schema_version":"1.7.3"}