Impact
The vulnerability is a use‑after‑free in the XSync fence triggering logic of the X.Org X server. It can crash the server and potentially corrupt memory, leading to denial of service and possibly further compromise. The flaw is identified as CWE‑825.
Affected Systems
Red Hat Enterprise Linux 6 through 10 that include the X.Org X server are affected. The update for the X.Org X server is included in Red Hat errata RHSA‑2026:10739. Vendor version information is not specified in the data.
Risk and Exploitability
The CVSS score of 7.8 categorizes this as a high‑severity flaw, while the EPSS score of less than 1% indicates that the probability of exploitation is low and that there is no current listing in the CISA KEV catalog. An attacker with access to the X11 server can exploit the flaw without user interaction; exposure may be local or remote if the X server is reachable from an untrusted network. The use‑after‑free can cause a crash and may lead to memory corruption, which could be leveraged for further system compromise.
OpenCVE Enrichment