xorg-x11-server-1.20.11-28.el8_10

エラータID: AXSA:2026-533:01

Release date: 
Monday, May 4, 2026 - 15:51
Subject: 
xorg-x11-server-1.20.11-28.el8_10
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
High
Description: 

X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.

Security Fix(es):

* xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999)
* xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001)
* xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2026-33999
A flaw was found in the X.Org X server. This integer underflow vulnerability, specifically in the XKB compatibility map handling, allows an attacker with local or remote X11 server access to trigger a buffer read overrun. This can lead to memory-safety violations and potentially a denial of service (DoS) or other severe impacts.
CVE-2026-34001
A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit this without user interaction, leading to a server crash and potentially enabling memory corruption. This could result in a denial of service or further compromise of the system.
CVE-2026-34003
A flaw was found in the X.Org X server's XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. xorg-x11-server-1.20.11-28.el8_10.src.rpm
    MD5: d387053d95d42a7e85a70e916d0e83af
    SHA-256: ff5d3e01c930de14a32cd6b7e08a7836c50a0a3025bbc37a4d8780f401ad4b43
    Size: 6.29 MB

Asianux Server 8 for x86_64
  1. xorg-x11-server-common-1.20.11-28.el8_10.x86_64.rpm
    MD5: 5487c9180ba01f1c7eb15155f62be631
    SHA-256: 70a6560d145710a40b529d9c64acefd48b292b56c5a91854075f370b7a954d8a
    Size: 45.09 kB
  2. xorg-x11-server-devel-1.20.11-28.el8_10.i686.rpm
    MD5: 7a3f3132990323d472616a10d87d1612
    SHA-256: aa10046417f828adf9e0a2238a5a4b82b7fb653068d88dbc7ac9b7a77091fe3b
    Size: 249.14 kB
  3. xorg-x11-server-devel-1.20.11-28.el8_10.x86_64.rpm
    MD5: 41e85b8807a6844506a84158112295d3
    SHA-256: 80a7651e12ada8925c304ad47dfdfa7a5cde9e3fc7d4ff77c357e9a328d60f25
    Size: 249.11 kB
  4. xorg-x11-server-source-1.20.11-28.el8_10.noarch.rpm
    MD5: 8a5330e7cadea16a2d8204a94c4317a1
    SHA-256: 217f888d0fa6a7b4377bc8598b8d866e4f69e6c8aed17de7473234d071bea20c
    Size: 2.43 MB
  5. xorg-x11-server-Xdmx-1.20.11-28.el8_10.x86_64.rpm
    MD5: 24be7ab815eab53840dc21007bdafdd5
    SHA-256: 07ec8e1f5bd86b39d2e41cfbf73c086f07eb332d170eac0d1a320fa2474c2c37
    Size: 905.57 kB
  6. xorg-x11-server-Xephyr-1.20.11-28.el8_10.x86_64.rpm
    MD5: c459179a999188b06f40050c74a920c2
    SHA-256: 534150605c60bf7dfd7ddf07eb90c7e1c296a9399f1f4ab04624bff4984e5761
    Size: 1.01 MB
  7. xorg-x11-server-Xnest-1.20.11-28.el8_10.x86_64.rpm
    MD5: f2f21d922b0b25ff48f00011cd558e7b
    SHA-256: fe951f229eaaeeda922f4502874d22223124d30ec4e0858152386c8614296476
    Size: 722.12 kB
  8. xorg-x11-server-Xorg-1.20.11-28.el8_10.x86_64.rpm
    MD5: f0193288ebf11c93f34d2d3e45a83d78
    SHA-256: 26f0e4520d53692ca5a15721fe6fefcc763cdd53547bf9505e0ceea97c1f7b7c
    Size: 1.49 MB
  9. xorg-x11-server-Xvfb-1.20.11-28.el8_10.x86_64.rpm
    MD5: 8e556feaf793082d00602ef754659d27
    SHA-256: 099d1eb3afcd6abf4cdb40b0f528cd39896f094129282858e345d33af3c1f798
    Size: 875.25 kB