First published: Sat Aug 25 2018(Updated: )
An infinite loop when reaching EOL unexpectedly in compose/parser.c (aka the keymap parser) in xkbcommon before 0.8.1 could be used by local attackers to cause a denial of service during parsing of crafted keymap files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libxkbcommon | <0.8.1 | 0.8.1 |
debian/libxkbcommon | 1.0.3-2 1.5.0-1 1.6.0-1 | |
dbus-common | <0.8.1 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15856 is classified as a denial of service vulnerability due to an infinite loop in the xkbcommon keymap parser.
To fix CVE-2018-15856, update the libxkbcommon package to version 0.8.1 or higher.
CVE-2018-15856 affects libxkbcommon versions below 0.8.1 on various Linux distributions including Red Hat and Debian.
CVE-2018-15856 can be exploited by local attackers through the use of crafted keymap files that trigger an infinite loop.
If you cannot update, consider implementing security controls to limit file access to keymap files from untrusted users.