Impact
An access to an uninitialized pointer flaw was found in the compredirectwindow() routine of X.Org and Xwayland. When a backing pixmap cannot be allocated, compCheckRedirect() may return a BadAlloc error without completing earlier validation of the window tree. This leaves partially initialized data that is used later, resulting in unpredictable memory corruption that can potentially allow an attacker to crash the display server or execute arbitrary code, depending on how the corrupted data is leveraged.
Affected Systems
The vulnerability affects multiple Red Hat Enterprise Linux releases, including RHEL 6, 7, 8, 8.2, 8.4, 8.6, 8.8, 9, 9.0, 9.2, 9.4, and 10, together with their extended update and support branches. It also impacts packages that bundle the Xorg server, Xwayland, and TigerVNC drivers that incorporate Xwayland code. Non‑Red Hat distributions that employ these components are similarly at risk if the Xorg/Xwayland packages remain unpatched.
Risk and Exploitability
The CVSS score of 7.8 indicates a high severity, while the EPSS score of less than 1% suggests a low likelihood of current exploitation. The vulnerability is not listed in the CISA KEV catalog, and no public exploits are known. The most likely attack vector is local, since Xorg and Xwayland run in user space on the host. An attacker who can cause the allocation failure—such as by crafting a special window—might trigger a crash or potentially gain code execution, but reliable exploitation would require local access or compromise of the display server. Consequently, the risk is moderate, but the vulnerability should be remediated promptly.
OpenCVE Enrichment
Debian DLA
Debian DSA
EUVD
Ubuntu USN