Impact
A use‑after‑free vulnerability exists in the X.Org Server and Xwayland components; the flaw is triggered when an alarm is altered, causing the SyncInitTrigger() function to be invoked after error handling that may leave a dangling pointer, potentially allowing an attacker who can manipulate alarm parameters to corrupt memory and execute arbitrary code, jeopardizing confidentiality, integrity, and availability.
Affected Systems
The flaw impacts Red Hat Enterprise Linux releases 6, 7, 8, 9, and 10, including their extended support branches such as RHEL ELS, RHEL EUS, and RHEL TUS, as well as the X.org and Xwayland packages used by Red Hat and third‑party distributions; it also touches Tigervnc when bundled with these components, with no specific product or version ranges listed beyond the fact that current installations of the affected X packages are vulnerable until patched.
Risk and Exploitability
The CVSS score of 7.8 indicates a high severity, while the EPSS score of less than 1 % suggests limited exploitation likelihood; the vulnerability is not currently in the CISA KEV catalogue. An attacker with local access to the X server—or potentially remote access if the X server is exposed—could exploit the use‑after‑free to compromise the system. Without an official workaround, vendors rely on patches for mitigation.
OpenCVE Enrichment
Debian DLA
Debian DSA
EUVD
Ubuntu USN