You are here
Home > Preporuke > Sigurnosni nedostaci programske biblioteke libxkbcommon

Sigurnosni nedostaci programske biblioteke libxkbcommon

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

openSUSE Security Update: Security update for libxkbcommon
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:3802-1
Rating: low
References: #1105832
Cross-References: CVE-2018-15853 CVE-2018-15854 CVE-2018-15855
CVE-2018-15856 CVE-2018-15857 CVE-2018-15858
CVE-2018-15859 CVE-2018-15861 CVE-2018-15862
CVE-2018-15863 CVE-2018-15864
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes 11 vulnerabilities is now available.

Description:

This update for libxkbcommon to version 0.8.2 fixes the following issues:

– Fix a few NULL-dereferences, out-of-bounds access and undefined behavior
in the XKB text format parser.
– CVE-2018-15853: Endless recursion could have been used by local
attackers to crash xkbcommon users by supplying a crafted keymap file
that triggers boolean negation (bsc#1105832).
– CVE-2018-15854: Unchecked NULL pointer usage could have been used by
local attackers to crash (NULL pointer dereference) the xkbcommon parser
by supplying a crafted keymap file, because geometry tokens were
desupported incorrectly (bsc#1105832).
– CVE-2018-15855: Unchecked NULL pointer usage could have been used by
local attackers to crash (NULL pointer dereference) the xkbcommon parser
by supplying a crafted keymap file, because the XkbFile for an
xkb_geometry section was mishandled (bsc#1105832).
– CVE-2018-15856: An infinite loop when reaching EOL unexpectedly could be
used by local attackers to cause a denial of service during parsing of
crafted keymap files (bsc#1105832).
– CVE-2018-15857: An invalid free in ExprAppendMultiKeysymList could have
been used by local attackers to crash xkbcommon keymap parsers or
possibly have unspecified other impact by supplying a crafted keymap
file (bsc#1105832).
– CVE-2018-15858: Unchecked NULL pointer usage when handling invalid
aliases in CopyKeyAliasesToKeymap could have been used by local
attackers to crash (NULL pointer dereference) the xkbcommon parser by
supplying a crafted keymap file (bsc#1105832).
– CVE-2018-15859: Unchecked NULL pointer usage when parsing invalid atoms
in ExprResolveLhs could have been used by local attackers to crash (NULL
pointer dereference) the xkbcommon parser by supplying a crafted keymap
file, because lookup failures are mishandled (bsc#1105832).
– CVE-2018-15861: Unchecked NULL pointer usage in ExprResolveLhs could
have been used by local attackers to crash (NULL pointer dereference)
the xkbcommon parser by supplying a crafted keymap file that triggers an
xkb_intern_atom failure (bsc#1105832).
– CVE-2018-15862: Unchecked NULL pointer usage in LookupModMask could have
been used by local attackers to crash (NULL pointer dereference) the
xkbcommon parser by supplying a crafted keymap file with invalid virtual
modifiers (bsc#1105832).
– CVE-2018-15863: Unchecked NULL pointer usage in ResolveStateAndPredicate
could have been used by local attackers to crash (NULL pointer
dereference) the xkbcommon parser by supplying a crafted keymap file
with a no-op modmask expression (bsc#1105832).
– CVE-2018-15864: Unchecked NULL pointer usage in resolve_keysym could
have been used by local attackers to crash (NULL pointer dereference)
the xkbcommon parser by supplying a crafted keymap file, because a map
access attempt can
occur for a map that was never created (bsc#1105832).

This update was imported from the SUSE:SLE-15:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 15.0:

zypper in -t patch openSUSE-2018-1418=1

Package List:

– openSUSE Leap 15.0 (i586 x86_64):

libxkbcommon-debugsource-0.8.2-lp150.2.3.1
libxkbcommon-devel-0.8.2-lp150.2.3.1
libxkbcommon-x11-0-0.8.2-lp150.2.3.1
libxkbcommon-x11-0-debuginfo-0.8.2-lp150.2.3.1
libxkbcommon-x11-devel-0.8.2-lp150.2.3.1
libxkbcommon0-0.8.2-lp150.2.3.1
libxkbcommon0-debuginfo-0.8.2-lp150.2.3.1

– openSUSE Leap 15.0 (x86_64):

libxkbcommon-devel-32bit-0.8.2-lp150.2.3.1
libxkbcommon-x11-0-32bit-0.8.2-lp150.2.3.1
libxkbcommon-x11-0-32bit-debuginfo-0.8.2-lp150.2.3.1
libxkbcommon-x11-devel-32bit-0.8.2-lp150.2.3.1
libxkbcommon0-32bit-0.8.2-lp150.2.3.1
libxkbcommon0-32bit-debuginfo-0.8.2-lp150.2.3.1

References:

https://www.suse.com/security/cve/CVE-2018-15853.html
https://www.suse.com/security/cve/CVE-2018-15854.html
https://www.suse.com/security/cve/CVE-2018-15855.html
https://www.suse.com/security/cve/CVE-2018-15856.html
https://www.suse.com/security/cve/CVE-2018-15857.html
https://www.suse.com/security/cve/CVE-2018-15858.html
https://www.suse.com/security/cve/CVE-2018-15859.html
https://www.suse.com/security/cve/CVE-2018-15861.html
https://www.suse.com/security/cve/CVE-2018-15862.html
https://www.suse.com/security/cve/CVE-2018-15863.html
https://www.suse.com/security/cve/CVE-2018-15864.html
https://bugzilla.suse.com/1105832


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorJosip Papratovic
Cert idNCERT-REF-2018-11-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa amanda

Otkriveni je sigurnosni nedostatak u programskom paketu amanda za operacijski sustav openSUSE. Otkriveni nedostatak potencijalnim napadačima omogućuje stjecanje uvećanih ovlasti....

Close