Description
Unchecked NULL pointer usage in resolve_keysym in xkbcomp/parser.y in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because a map access attempt can occur for a map that was never created.
References (6)
Core 6
Core References
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201810-05
Mailing List, Patch, Third Party Advisory x_refsource_misc
https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html
Patch, Third Party Advisory x_refsource_misc
https://github.com/xkbcommon/libxkbcommon/commit/a8ea7a1d3daa7bdcb877615ae0a252c189153bd2
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3786-1/
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3786-2/
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:2079
Scores
CVSS v3
5.5
EPSS
0.0004
EPSS Percentile
13.1%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-476
Status
published
Products (5)
canonical/ubuntu_linux
14.04
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
18.04
xkbcommon/libxkbcommon
< 0.8.1
xkbcommon/xkbcommon
< 0.8.1
Published
Aug 25, 2018
Tracked Since
Feb 18, 2026