{"id":"ALPINE-CVE-2018-15859","details":"Unchecked NULL pointer usage when parsing invalid atoms in ExprResolveLhs in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because lookup failures are mishandled.","modified":"2026-03-09T01:15:35.385472Z","published":"2018-08-25T21:29:02.170Z","upstream":["CVE-2018-15859"],"references":[{"type":"ADVISORY","url":"https://security.alpinelinux.org/vuln/CVE-2018-15859"}],"affected":[{"package":{"name":"xkbcomp","ecosystem":"Alpine:v3.18","purl":"pkg:apk/alpine/xkbcomp?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.5.0-r0"}]}],"versions":["1.0.5-r0","1.1.1-r0","1.1.1-r1","1.1.1-r2","1.4.0-r0","1.4.0-r1","1.4.0-r2","1.4.1-r0","1.4.2-r0","1.4.3-r0","1.4.4-r0","1.4.5-r0","1.4.5-r1","1.4.6-r0","1.4.6-r1","1.4.7-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2018-15859.json"}},{"package":{"name":"xkbcomp","ecosystem":"Alpine:v3.19","purl":"pkg:apk/alpine/xkbcomp?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.5.0-r0"}]}],"versions":["1.0.5-r0","1.1.1-r0","1.1.1-r1","1.1.1-r2","1.4.0-r0","1.4.0-r1","1.4.0-r2","1.4.1-r0","1.4.2-r0","1.4.3-r0","1.4.4-r0","1.4.5-r0","1.4.5-r1","1.4.6-r0","1.4.6-r1","1.4.7-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2018-15859.json"}},{"package":{"name":"xkbcomp","ecosystem":"Alpine:v3.20","purl":"pkg:apk/alpine/xkbcomp?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.5.0-r0"}]}],"versions":["1.0.5-r0","1.1.1-r0","1.1.1-r1","1.1.1-r2","1.4.0-r0","1.4.0-r1","1.4.0-r2","1.4.1-r0","1.4.2-r0","1.4.3-r0","1.4.4-r0","1.4.5-r0","1.4.5-r1","1.4.6-r0","1.4.6-r1","1.4.7-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2018-15859.json"}},{"package":{"name":"xkbcomp","ecosystem":"Alpine:v3.21","purl":"pkg:apk/alpine/xkbcomp?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.5.0-r0"}]}],"versions":["1.0.5-r0","1.1.1-r0","1.1.1-r1","1.1.1-r2","1.4.0-r0","1.4.0-r1","1.4.0-r2","1.4.1-r0","1.4.2-r0","1.4.3-r0","1.4.4-r0","1.4.5-r0","1.4.5-r1","1.4.6-r0","1.4.6-r1","1.4.7-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2018-15859.json"}},{"package":{"name":"xkbcomp","ecosystem":"Alpine:v3.22","purl":"pkg:apk/alpine/xkbcomp?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.5.0-r0"}]}],"versions":["1.0.5-r0","1.1.1-r0","1.1.1-r1","1.1.1-r2","1.4.0-r0","1.4.0-r1","1.4.0-r2","1.4.1-r0","1.4.2-r0","1.4.3-r0","1.4.4-r0","1.4.5-r0","1.4.5-r1","1.4.6-r0","1.4.6-r1","1.4.7-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2018-15859.json"}},{"package":{"name":"xkbcomp","ecosystem":"Alpine:v3.23","purl":"pkg:apk/alpine/xkbcomp?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.5.0-r0"}]}],"versions":["1.0.5-r0","1.1.1-r0","1.1.1-r1","1.1.1-r2","1.4.0-r0","1.4.0-r1","1.4.0-r2","1.4.1-r0","1.4.2-r0","1.4.3-r0","1.4.4-r0","1.4.5-r0","1.4.5-r1","1.4.6-r0","1.4.6-r1","1.4.7-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2018-15859.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}