This vulnerability requires a legacy multi-screen setup with multiple protocol screens ("Zaphod"). If the pointer is warped from one screen to the root window of the other screen, the enter/leave code may retain a reference to the previous pointer window. Destroying this window leaves that reference in place, other windows may then trigger a use-after-free bug when they are destroyed. This bug can be triggered only under very specific conditions, in particular it requires an XWarpPointer call and that the pointer never enters a client window on the other screen. Reference: https://lists.x.org/archives/xorg-announce/2023-October/003430.html
Created xorg-x11-server tracking bugs for this issue: Affects: fedora-all [bug 2246140]
Created tigervnc tracking bugs for this issue: Affects: fedora-all [bug 2247469]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:7428 https://access.redhat.com/errata/RHSA-2023:7428
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:2169 https://access.redhat.com/errata/RHSA-2024:2169
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:2298 https://access.redhat.com/errata/RHSA-2024:2298
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:2995 https://access.redhat.com/errata/RHSA-2024:2995
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:3067 https://access.redhat.com/errata/RHSA-2024:3067