Impact
A use‑after‑free flaw in the X.Org X Server and XWayland causes a freed memory reference when a device that is still frozen is removed. Replay of queued events can corrupt memory and may allow arbitrary code execution. The vulnerability is a classic unsafe memory deallocation error (CWE‑416).
Affected Systems
Red Hat Enterprise Linux 6, 7, 8, 9, and 10, including all extended, advanced, and specialized update streams, are affected. The flaw also impacts the X.Org X Server, XWayland, and Tiger VNC applications distributed by Red Hat.
Risk and Exploitability
The CVSS score of 7.8 indicates high severity, while the EPSS score of < 1 % suggests low current exploitation activity. The flaw appears to require a local or privileged context, such as the removal of a frozen device during a user session, rather than direct remote network input. It is not listed in the CISA KEV catalog. With no temporary workaround available, the only effective mitigations are vendor patches and maintaining up‑to‑date kernel and application releases.
OpenCVE Enrichment
Debian DLA
Debian DSA
EUVD
Ubuntu USN