Impact
A buffer overflow flaw exists in the X.Org server and its Xwayland component. When XkbChangeTypesOfKey() is called with a zero group it resizes the key symbols table to zero but leaves the key actions unchanged. A subsequent call with a non‑zero group size triggers a buffer overflow, potentially allowing arbitrary code execution or a denial‑of‑service through a crash. The flaw is identified as CWE‑119.
Affected Systems
Red Hat Enterprise Linux releases 6, 7, 8 (including 8.2, 8.4, 8.6, 8.8, 9, 9.0, 9.2, 9.4, and 10) are impacted as they ship the vulnerable X.Org and Xwayland packages. The exposed packages are part of the Xorg server and Xwayland application components distributed under the Red Hat branding. Users running these RHEL versions with X11 or Xwayland enabled are potentially affected.
Risk and Exploitability
The CVSS score of 7.8 indicates moderately high severity. The EPSS score of less than 1 percent suggests a very low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. An attacker needs local or remote access to an X server that accepts connections on a network or Unix socket and can issue the XkbChangeTypesOfKey request—conditions typically available to any user running an X session or any client able to hijack a network‑connected X server. Successful exploitation could lead to memory corruption and arbitrary code execution with the privileges of the X server process.
OpenCVE Enrichment
Debian DLA
Debian DSA
EUVD
Ubuntu USN