vulnerability
Red Hat: CVE-2018-15855: Moderate: Xorg security and bug fix update (RHSA-2019:2079)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:L/Au:N/C:N/I:N/A:P) | Aug 25, 2018 | Aug 7, 2019 | Aug 8, 2019 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:P)
Published
Aug 25, 2018
Added
Aug 7, 2019
Modified
Aug 8, 2019
Description
Unchecked NULL pointer usage in xkbcommon before 0.8.1 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because the XkbFile for an xkb_geometry section was mishandled.
Solutions
redhat-upgrade-gdmredhat-upgrade-gdm-debuginforedhat-upgrade-gdm-develredhat-upgrade-gdm-pam-extensions-develredhat-upgrade-libx11redhat-upgrade-libx11-commonredhat-upgrade-libx11-debuginforedhat-upgrade-libx11-develredhat-upgrade-libxkbcommonredhat-upgrade-libxkbcommon-debuginforedhat-upgrade-libxkbcommon-develredhat-upgrade-libxkbcommon-x11redhat-upgrade-libxkbcommon-x11-develredhat-upgrade-mesa-libglwredhat-upgrade-mesa-libglw-debuginforedhat-upgrade-mesa-libglw-develredhat-upgrade-xorg-x11-drv-atiredhat-upgrade-xorg-x11-drv-ati-debuginforedhat-upgrade-xorg-x11-drv-vesaredhat-upgrade-xorg-x11-drv-vesa-debuginforedhat-upgrade-xorg-x11-drv-wacomredhat-upgrade-xorg-x11-drv-wacom-debuginforedhat-upgrade-xorg-x11-drv-wacom-develredhat-upgrade-xorg-x11-server-commonredhat-upgrade-xorg-x11-server-debuginforedhat-upgrade-xorg-x11-server-develredhat-upgrade-xorg-x11-server-sourceredhat-upgrade-xorg-x11-server-xdmxredhat-upgrade-xorg-x11-server-xephyrredhat-upgrade-xorg-x11-server-xnestredhat-upgrade-xorg-x11-server-xorgredhat-upgrade-xorg-x11-server-xvfbredhat-upgrade-xorg-x11-server-xwayland
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.