CVE-2018-15858

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-15858
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-15858.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2018-15858
Downstream
Related
Published
2018-08-25T21:29:02Z
Modified
2025-09-16T06:52:16.973637Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Unchecked NULL pointer usage when handling invalid aliases in CopyKeyAliasesToKeymap in xkbcomp/keycodes.c in xkbcommon before 0.8.1 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file.

References

Affected packages

Debian:11 / libxkbcommon

Package

Name
libxkbcommon
Purl
pkg:deb/debian/libxkbcommon?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.8.2-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:12 / libxkbcommon

Package

Name
libxkbcommon
Purl
pkg:deb/debian/libxkbcommon?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.8.2-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:13 / libxkbcommon

Package

Name
libxkbcommon
Purl
pkg:deb/debian/libxkbcommon?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.8.2-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:14 / libxkbcommon

Package

Name
libxkbcommon
Purl
pkg:deb/debian/libxkbcommon?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.8.2-1

Ecosystem specific

{
    "urgency": "low"
}

Git / github.com/xkbcommon/libxkbcommon

Affected ranges

Type
GIT
Repo
https://github.com/xkbcommon/libxkbcommon
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

xkbcommon-0.*

xkbcommon-0.2.0
xkbcommon-0.3.0
xkbcommon-0.3.1
xkbcommon-0.3.2
xkbcommon-0.4.0
xkbcommon-0.4.1
xkbcommon-0.4.2
xkbcommon-0.4.3
xkbcommon-0.5.0
xkbcommon-0.6.0
xkbcommon-0.6.1
xkbcommon-0.7.0
xkbcommon-0.7.1
xkbcommon-0.7.2
xkbcommon-0.8.0

Database specific

{
    "vanir_signatures": [
        {
            "source": "https://github.com/xkbcommon/libxkbcommon/commit/badb428e63387140720f22486b3acbd3d738859f",
            "deprecated": false,
            "id": "CVE-2018-15858-50d75490",
            "signature_version": "v1",
            "target": {
                "function": "CopyKeyAliasesToKeymap",
                "file": "src/xkbcomp/keycodes.c"
            },
            "digest": {
                "function_hash": "186686948108093335100211637034822400959",
                "length": 1095.0
            },
            "signature_type": "Function"
        },
        {
            "source": "https://github.com/xkbcommon/libxkbcommon/commit/badb428e63387140720f22486b3acbd3d738859f",
            "deprecated": false,
            "id": "CVE-2018-15858-ecd4f68f",
            "signature_version": "v1",
            "target": {
                "file": "src/xkbcomp/keycodes.c"
            },
            "digest": {
                "line_hashes": [
                    "105902513952053338799186888379720812683",
                    "2813125074525204487135130095179841291",
                    "131041052524404914410509899012465260609",
                    "290112449741970181751028486238856450678",
                    "242851341871147170074241260793091770684",
                    "152433531990571504873668951939946627689",
                    "281007177730380793451923478109576055903",
                    "203541298282925731688484467531696055910",
                    "276973798188368871965725525755796654910",
                    "70567054245202246809013427786548308546"
                ],
                "threshold": 0.9
            },
            "signature_type": "Line"
        }
    ]
}