Impact
A flaw in the X.Org X server’s out‑of‑bounds read during XKB geometry processing enables an attacker with an X11 connection, whether local or remote, to read uninitialized or out‑of‑bounds memory, potentially exposing sensitive data or causing the server to crash, resulting in denial of service. The weakness is identified as CWE‑125 and does not require user interaction.
Affected Systems
The vulnerability affects Red Hat Enterprise Linux releases 6, 7, 8, 9, and 10, where the default X11/Xorg server is installed.
Risk and Exploitability
The CVSS score of 6.1 indicates medium severity. No EPSS score is available, so the current exploitation probability is unknown, and the vulnerability is not listed in the CISA KEV catalog. An attacker can exploit the flaw by connecting directly to the X11 server or via X11 forwarding in SSH, and the vulnerability can be triggered without user intervention, meaning that anyone who can reach the X server can compromise confidentiality, integrity, or availability.
OpenCVE Enrichment