openSUSE Security Update: Security update for libxkbcommon
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2018:3802-1
Rating:             low
References:         #1105832 
Cross-References:   CVE-2018-15853 CVE-2018-15854 CVE-2018-15855
                    CVE-2018-15856 CVE-2018-15857 CVE-2018-15858
                    CVE-2018-15859 CVE-2018-15861 CVE-2018-15862
                    CVE-2018-15863 CVE-2018-15864
Affected Products:
                    openSUSE Leap 15.0
______________________________________________________________________________

   An update that fixes 11 vulnerabilities is now available.

Description:

   This update for libxkbcommon to version 0.8.2 fixes the following issues:

   - Fix a few NULL-dereferences, out-of-bounds access and undefined behavior
     in the XKB text format parser.
   - CVE-2018-15853: Endless recursion could have been used by local
     attackers to crash xkbcommon users by supplying a crafted keymap file
     that triggers boolean negation (bsc#1105832).
   - CVE-2018-15854: Unchecked NULL pointer usage could have been used by
     local attackers to crash (NULL pointer dereference) the xkbcommon parser
     by supplying a crafted keymap file, because geometry tokens were
     desupported incorrectly (bsc#1105832).
   - CVE-2018-15855: Unchecked NULL pointer usage could have been used by
     local attackers to crash (NULL pointer dereference) the xkbcommon parser
     by supplying a crafted keymap file, because the XkbFile for an
     xkb_geometry section was mishandled (bsc#1105832).
   - CVE-2018-15856: An infinite loop when reaching EOL unexpectedly could be
     used by local attackers to cause a denial of service during parsing of
     crafted keymap files (bsc#1105832).
   - CVE-2018-15857: An invalid free in ExprAppendMultiKeysymList could have
     been used by local attackers to crash xkbcommon keymap parsers or
     possibly have unspecified other impact by supplying a crafted keymap
     file (bsc#1105832).
   - CVE-2018-15858: Unchecked NULL pointer usage when handling invalid
     aliases in CopyKeyAliasesToKeymap could have been used by local
     attackers to crash (NULL pointer dereference) the xkbcommon parser by
     supplying a crafted keymap file (bsc#1105832).
   - CVE-2018-15859: Unchecked NULL pointer usage when parsing invalid atoms
     in ExprResolveLhs could have been used by local attackers to crash (NULL
     pointer dereference) the xkbcommon parser by supplying a crafted keymap
     file, because lookup failures are mishandled (bsc#1105832).
   - CVE-2018-15861: Unchecked NULL pointer usage in ExprResolveLhs could
     have been used by local attackers to crash (NULL pointer dereference)
     the xkbcommon parser by supplying a crafted keymap file that triggers an
     xkb_intern_atom failure (bsc#1105832).
   - CVE-2018-15862: Unchecked NULL pointer usage in LookupModMask could have
     been used by local attackers to crash (NULL pointer dereference) the
     xkbcommon parser by supplying a crafted keymap file with invalid virtual
     modifiers (bsc#1105832).
   - CVE-2018-15863: Unchecked NULL pointer usage in ResolveStateAndPredicate
     could have been used by local attackers to crash (NULL pointer
     dereference) the xkbcommon parser by supplying a crafted keymap file
     with a no-op modmask expression (bsc#1105832).
   - CVE-2018-15864: Unchecked NULL pointer usage in resolve_keysym could
     have been used by local attackers to crash (NULL pointer dereference)
     the xkbcommon parser by supplying a crafted keymap file, because a map
     access attempt can
     occur for a map that was never created (bsc#1105832).

   This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.0:

      zypper in -t patch openSUSE-2018-1418=1



Package List:

   - openSUSE Leap 15.0 (i586 x86_64):

      libxkbcommon-debugsource-0.8.2-lp150.2.3.1
      libxkbcommon-devel-0.8.2-lp150.2.3.1
      libxkbcommon-x11-0-0.8.2-lp150.2.3.1
      libxkbcommon-x11-0-debuginfo-0.8.2-lp150.2.3.1
      libxkbcommon-x11-devel-0.8.2-lp150.2.3.1
      libxkbcommon0-0.8.2-lp150.2.3.1
      libxkbcommon0-debuginfo-0.8.2-lp150.2.3.1

   - openSUSE Leap 15.0 (x86_64):

      libxkbcommon-devel-32bit-0.8.2-lp150.2.3.1
      libxkbcommon-x11-0-32bit-0.8.2-lp150.2.3.1
      libxkbcommon-x11-0-32bit-debuginfo-0.8.2-lp150.2.3.1
      libxkbcommon-x11-devel-32bit-0.8.2-lp150.2.3.1
      libxkbcommon0-32bit-0.8.2-lp150.2.3.1
      libxkbcommon0-32bit-debuginfo-0.8.2-lp150.2.3.1


References:

   https://www.suse.com/security/cve/CVE-2018-15853.html
   https://www.suse.com/security/cve/CVE-2018-15854.html
   https://www.suse.com/security/cve/CVE-2018-15855.html
   https://www.suse.com/security/cve/CVE-2018-15856.html
   https://www.suse.com/security/cve/CVE-2018-15857.html
   https://www.suse.com/security/cve/CVE-2018-15858.html
   https://www.suse.com/security/cve/CVE-2018-15859.html
   https://www.suse.com/security/cve/CVE-2018-15861.html
   https://www.suse.com/security/cve/CVE-2018-15862.html
   https://www.suse.com/security/cve/CVE-2018-15863.html
   https://www.suse.com/security/cve/CVE-2018-15864.html
   https://bugzilla.suse.com/1105832

-- 

openSUSE: 2018:3802-1: libxkbcommon

November 17, 2018
An update that fixes 11 vulnerabilities is now available.

Description

This update for libxkbcommon to version 0.8.2 fixes the following issues: - Fix a few NULL-dereferences, out-of-bounds access and undefined behavior in the XKB text format parser. - CVE-2018-15853: Endless recursion could have been used by local attackers to crash xkbcommon users by supplying a crafted keymap file that triggers boolean negation (bsc#1105832). - CVE-2018-15854: Unchecked NULL pointer usage could have been used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because geometry tokens were desupported incorrectly (bsc#1105832). - CVE-2018-15855: Unchecked NULL pointer usage could have been used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because the XkbFile for an xkb_geometry section was mishandled (bsc#1105832). - CVE-2018-15856: An infinite loop when reaching EOL unexpectedly could be used by local attackers to cause a denial of service during parsing of crafted keymap files (bsc#1105832). - CVE-2018-15857: An invalid free in ExprAppendMultiKeysymList could have been used by local attackers to crash xkbcommon keymap parsers or possibly have unspecified other impact by supplying a crafted keymap file (bsc#1105832). - CVE-2018-15858: Unchecked NULL pointer usage when handling invalid aliases in CopyKeyAliasesToKeymap could have been used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file (bsc#1105832). - CVE-2018-15859: Unchecked NULL pointer usage when parsing invalid atoms in ExprResolveLhs could have been used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because lookup failures are mishandled (bsc#1105832). - CVE-2018-15861: Unchecked NULL pointer usage in ExprResolveLhs could have been used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file that triggers an xkb_intern_atom failure (bsc#1105832). - CVE-2018-15862: Unchecked NULL pointer usage in LookupModMask could have been used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file with invalid virtual modifiers (bsc#1105832). - CVE-2018-15863: Unchecked NULL pointer usage in ResolveStateAndPredicate could have been used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file with a no-op modmask expression (bsc#1105832). - CVE-2018-15864: Unchecked NULL pointer usage in resolve_keysym could have been used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because a map access attempt can occur for a map that was never created (bsc#1105832). This update was imported from the SUSE:SLE-15:Update update project.

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.0: zypper in -t patch openSUSE-2018-1418=1


Package List

- openSUSE Leap 15.0 (i586 x86_64): libxkbcommon-debugsource-0.8.2-lp150.2.3.1 libxkbcommon-devel-0.8.2-lp150.2.3.1 libxkbcommon-x11-0-0.8.2-lp150.2.3.1 libxkbcommon-x11-0-debuginfo-0.8.2-lp150.2.3.1 libxkbcommon-x11-devel-0.8.2-lp150.2.3.1 libxkbcommon0-0.8.2-lp150.2.3.1 libxkbcommon0-debuginfo-0.8.2-lp150.2.3.1 - openSUSE Leap 15.0 (x86_64): libxkbcommon-devel-32bit-0.8.2-lp150.2.3.1 libxkbcommon-x11-0-32bit-0.8.2-lp150.2.3.1 libxkbcommon-x11-0-32bit-debuginfo-0.8.2-lp150.2.3.1 libxkbcommon-x11-devel-32bit-0.8.2-lp150.2.3.1 libxkbcommon0-32bit-0.8.2-lp150.2.3.1 libxkbcommon0-32bit-debuginfo-0.8.2-lp150.2.3.1


References

https://www.suse.com/security/cve/CVE-2018-15853.html https://www.suse.com/security/cve/CVE-2018-15854.html https://www.suse.com/security/cve/CVE-2018-15855.html https://www.suse.com/security/cve/CVE-2018-15856.html https://www.suse.com/security/cve/CVE-2018-15857.html https://www.suse.com/security/cve/CVE-2018-15858.html https://www.suse.com/security/cve/CVE-2018-15859.html https://www.suse.com/security/cve/CVE-2018-15861.html https://www.suse.com/security/cve/CVE-2018-15862.html https://www.suse.com/security/cve/CVE-2018-15863.html https://www.suse.com/security/cve/CVE-2018-15864.html https://bugzilla.suse.com/1105832--


Severity
Announcement ID: openSUSE-SU-2018:3802-1
Rating: low
Affected Products: openSUSE Leap 15.0

Related News