{"id":"CVE-2018-15857","details":"An invalid free in ExprAppendMultiKeysymList in xkbcomp/ast-build.c in xkbcommon before 0.8.1 could be used by local attackers to crash xkbcommon keymap parsers or possibly have unspecified other impact by supplying a crafted keymap file.","modified":"2026-05-18T15:05:55.065569Z","published":"2018-08-25T21:29:01.953Z","related":["SUSE-SU-2018:3685-1","SUSE-SU-2024:0037-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","cpes":["cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"],"vendor_product":"canonical:ubuntu_linux","extracted_events":[{"last_affected":"14.04"},{"last_affected":"16.04"},{"last_affected":"18.04"}]},{"source":"CPE_FIELD","cpes":["cpe:2.3:a:xkbcommon:xkbcommon:*:*:*:*:*:*:*:*"],"vendor_product":"xkbcommon:xkbcommon","extracted_events":[{"fixed":"0.8.1"}]}]},"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2079"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201810-05"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3786-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3786-2/"},{"type":"FIX","url":"https://github.com/xkbcommon/libxkbcommon/commit/c1e5ac16e77a21f87bdf3bc4dea61b037a17dddb"},{"type":"FIX","url":"https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/xkbcommon/libxkbcommon","events":[{"introduced":"0"},{"fixed":"76a6048cf8f6dfcd64ffff4e36f5362ead385706"},{"fixed":"c1e5ac16e77a21f87bdf3bc4dea61b037a17dddb"}],"database_specific":{"source":["CPE_FIELD","REFERENCES"],"cpe":"cpe:2.3:a:xkbcommon:libxkbcommon:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"fixed":"0.8.1"}]}}],"versions":["xkbcommon-0.8.0","xkbcommon-0.7.2","xkbcommon-0.7.1","xkbcommon-0.7.0","xkbcommon-0.6.1","xkbcommon-0.6.0","xkbcommon-0.5.0","xkbcommon-0.4.3","xkbcommon-0.4.2","xkbcommon-0.4.1","xkbcommon-0.4.0","xkbcommon-0.3.2","xkbcommon-0.3.1","xkbcommon-0.3.0","xkbcommon-0.2.0"],"database_specific":{"vanir_signatures":[{"source":"https://github.com/xkbcommon/libxkbcommon/commit/c1e5ac16e77a21f87bdf3bc4dea61b037a17dddb","target":{"function":"ExprAppendMultiKeysymList","file":"src/xkbcomp/ast-build.c"},"id":"CVE-2018-15857-bead969c","digest":{"length":421,"function_hash":"246204298610063233728311461425499783433"},"signature_type":"Function","deprecated":false,"signature_version":"v1"},{"source":"https://github.com/xkbcommon/libxkbcommon/commit/c1e5ac16e77a21f87bdf3bc4dea61b037a17dddb","target":{"file":"src/xkbcomp/ast-build.c"},"id":"CVE-2018-15857-d2756d45","digest":{"line_hashes":["157951890283692381345264618911296666620","175364020308458040961507052570546156758","75057826269913629386390900143212499585","256459290595105037938915078059512908386"],"threshold":0.9},"signature_type":"Line","deprecated":false,"signature_version":"v1"}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-15857.json","vanir_signatures_modified":"2026-05-18T15:05:55Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}