Description
Unchecked NULL pointer usage in xkbcommon before 0.8.1 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because the XkbFile for an xkb_geometry section was mishandled.
References (6)
Core 6
Core References
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201810-05
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3786-1/
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3786-2/
Third Party Advisory x_refsource_misc
https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html
Patch, Third Party Advisory x_refsource_misc
https://github.com/xkbcommon/libxkbcommon/commit/917636b1d0d70205a13f89062b95e3a0fc31d4ff
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:2079
Scores
CVSS v3
5.5
EPSS
0.0004
EPSS Percentile
13.7%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-476
Status
published
Products (4)
canonical/ubuntu_linux
14.04
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
18.04
xkbcommon_project/xkbcommon
< 0.8.1
Published
Aug 25, 2018
Tracked Since
Feb 18, 2026