xorg-x11-server-1.20.11-28.el8_10
エラータID: AXSA:2026-533:01
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999)
* xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001)
* xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2026-33999
A flaw was found in the X.Org X server. This integer underflow vulnerability, specifically in the XKB compatibility map handling, allows an attacker with local or remote X11 server access to trigger a buffer read overrun. This can lead to memory-safety violations and potentially a denial of service (DoS) or other severe impacts.
CVE-2026-34001
A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit this without user interaction, leading to a server crash and potentially enabling memory corruption. This could result in a denial of service or further compromise of the system.
CVE-2026-34003
A flaw was found in the X.Org X server's XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible.
Update packages.
A flaw was found in the X.Org X server. This integer underflow vulnerability, specifically in the XKB compatibility map handling, allows an attacker with local or remote X11 server access to trigger a buffer read overrun. This can lead to memory-safety violations and potentially a denial of service (DoS) or other severe impacts.
A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit this without user interaction, leading to a server crash and potentially enabling memory corruption. This could result in a denial of service or further compromise of the system.
A flaw was found in the X.Org X server's XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible.
N/A
SRPMS
- xorg-x11-server-1.20.11-28.el8_10.src.rpm
MD5: d387053d95d42a7e85a70e916d0e83af
SHA-256: ff5d3e01c930de14a32cd6b7e08a7836c50a0a3025bbc37a4d8780f401ad4b43
Size: 6.29 MB
Asianux Server 8 for x86_64
- xorg-x11-server-common-1.20.11-28.el8_10.x86_64.rpm
MD5: 5487c9180ba01f1c7eb15155f62be631
SHA-256: 70a6560d145710a40b529d9c64acefd48b292b56c5a91854075f370b7a954d8a
Size: 45.09 kB - xorg-x11-server-devel-1.20.11-28.el8_10.i686.rpm
MD5: 7a3f3132990323d472616a10d87d1612
SHA-256: aa10046417f828adf9e0a2238a5a4b82b7fb653068d88dbc7ac9b7a77091fe3b
Size: 249.14 kB - xorg-x11-server-devel-1.20.11-28.el8_10.x86_64.rpm
MD5: 41e85b8807a6844506a84158112295d3
SHA-256: 80a7651e12ada8925c304ad47dfdfa7a5cde9e3fc7d4ff77c357e9a328d60f25
Size: 249.11 kB - xorg-x11-server-source-1.20.11-28.el8_10.noarch.rpm
MD5: 8a5330e7cadea16a2d8204a94c4317a1
SHA-256: 217f888d0fa6a7b4377bc8598b8d866e4f69e6c8aed17de7473234d071bea20c
Size: 2.43 MB - xorg-x11-server-Xdmx-1.20.11-28.el8_10.x86_64.rpm
MD5: 24be7ab815eab53840dc21007bdafdd5
SHA-256: 07ec8e1f5bd86b39d2e41cfbf73c086f07eb332d170eac0d1a320fa2474c2c37
Size: 905.57 kB - xorg-x11-server-Xephyr-1.20.11-28.el8_10.x86_64.rpm
MD5: c459179a999188b06f40050c74a920c2
SHA-256: 534150605c60bf7dfd7ddf07eb90c7e1c296a9399f1f4ab04624bff4984e5761
Size: 1.01 MB - xorg-x11-server-Xnest-1.20.11-28.el8_10.x86_64.rpm
MD5: f2f21d922b0b25ff48f00011cd558e7b
SHA-256: fe951f229eaaeeda922f4502874d22223124d30ec4e0858152386c8614296476
Size: 722.12 kB - xorg-x11-server-Xorg-1.20.11-28.el8_10.x86_64.rpm
MD5: f0193288ebf11c93f34d2d3e45a83d78
SHA-256: 26f0e4520d53692ca5a15721fe6fefcc763cdd53547bf9505e0ceea97c1f7b7c
Size: 1.49 MB - xorg-x11-server-Xvfb-1.20.11-28.el8_10.x86_64.rpm
MD5: 8e556feaf793082d00602ef754659d27
SHA-256: 099d1eb3afcd6abf4cdb40b0f528cd39896f094129282858e345d33af3c1f798
Size: 875.25 kB