vulnerability

Red Hat: CVE-2018-15854: Moderate: Xorg security and bug fix update (RHSA-2019:2079)

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:P)
Published
Aug 25, 2018
Added
Aug 7, 2019
Modified
Aug 8, 2019

Description

Unchecked NULL pointer usage in xkbcommon before 0.8.1 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because geometry tokens were desupported incorrectly.

Solution(s)

redhat-upgrade-gdmredhat-upgrade-gdm-debuginforedhat-upgrade-gdm-develredhat-upgrade-gdm-pam-extensions-develredhat-upgrade-libx11redhat-upgrade-libx11-commonredhat-upgrade-libx11-debuginforedhat-upgrade-libx11-develredhat-upgrade-libxkbcommonredhat-upgrade-libxkbcommon-debuginforedhat-upgrade-libxkbcommon-develredhat-upgrade-libxkbcommon-x11redhat-upgrade-libxkbcommon-x11-develredhat-upgrade-mesa-libglwredhat-upgrade-mesa-libglw-debuginforedhat-upgrade-mesa-libglw-develredhat-upgrade-xorg-x11-drv-atiredhat-upgrade-xorg-x11-drv-ati-debuginforedhat-upgrade-xorg-x11-drv-vesaredhat-upgrade-xorg-x11-drv-vesa-debuginforedhat-upgrade-xorg-x11-drv-wacomredhat-upgrade-xorg-x11-drv-wacom-debuginforedhat-upgrade-xorg-x11-drv-wacom-develredhat-upgrade-xorg-x11-server-commonredhat-upgrade-xorg-x11-server-debuginforedhat-upgrade-xorg-x11-server-develredhat-upgrade-xorg-x11-server-sourceredhat-upgrade-xorg-x11-server-xdmxredhat-upgrade-xorg-x11-server-xephyrredhat-upgrade-xorg-x11-server-xnestredhat-upgrade-xorg-x11-server-xorgredhat-upgrade-xorg-x11-server-xvfbredhat-upgrade-xorg-x11-server-xwayland
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.