Impact
The flaw resides in the X.Org X server’s XKB key types request validation, allowing a local attacker to send a crafted request that triggers an out‑of‑bounds read. This can expose sensitive information from memory or cause the X server to crash, resulting in a denial of service. The vulnerability is mitigated by correct bounds checking during request processing, but the current implementation fails to enforce it, exposing the system to data leakage or service interruption.
Affected Systems
The issue affects Red Hat Enterprise Linux 6, 7, 8, 9, and 10, which rely on the X.Org X server as part of the graphical stack. Versions impacted are those distributed under the standard RHEL releases and are listed in the corresponding Red Hat errata.
Risk and Exploitability
The CVSS score of 7.8 indicates a high severity level, and the EPSS score of < 1% suggests a low probability of current exploitation in the wild. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Based on the description, the likely attack vector is local; an attacker with access to the X server process or the ability to send network–level requests to the X server can craft the malicious input. The impact is therefore confined to systems where the X server is running, and exploitation requires local or at‑least network‑level access to the X server within the same host.
OpenCVE Enrichment