xorg-x11-server-1.20.11-33.el9_7

エラータID: AXSA:2026-534:02

Release date: 
Monday, May 4, 2026 - 16:08
Subject: 
xorg-x11-server-1.20.11-33.el9_7
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
High
Description: 

X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.

Security Fix(es):

* xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999)
* xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001)
* xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2026-33999
A flaw was found in the X.Org X server. This integer underflow vulnerability, specifically in the XKB compatibility map handling, allows an attacker with local or remote X11 server access to trigger a buffer read overrun. This can lead to memory-safety violations and potentially a denial of service (DoS) or other severe impacts.
CVE-2026-34001
A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit this without user interaction, leading to a server crash and potentially enabling memory corruption. This could result in a denial of service or further compromise of the system.
CVE-2026-34003
A flaw was found in the X.Org X server's XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. xorg-x11-server-1.20.11-33.el9_7.src.rpm
    MD5: 439454f37883f386a3ed57271a8ba651
    SHA-256: 8fe97af3f5d3ebe13b081feeb1f157d8097971597e7d68ef14e1b7aee1599f78
    Size: 6.32 MB

Asianux Server 9 for x86_64
  1. xorg-x11-server-common-1.20.11-33.el9_7.x86_64.rpm
    MD5: 882003f8d54746afcb98fad9dc5dc00f
    SHA-256: d173c46b1cc863c855d11bb554839d980c6cfd0aab699223ba87015721f55fb1
    Size: 33.51 kB
  2. xorg-x11-server-devel-1.20.11-33.el9_7.i686.rpm
    MD5: b6e6ddd49e07f9ab6ba0978323a24e24
    SHA-256: 2956f3ff19df26ea717b5dd9d39125396dfc7077c6961e7127944808519ceee0
    Size: 251.13 kB
  3. xorg-x11-server-devel-1.20.11-33.el9_7.x86_64.rpm
    MD5: 2ab098caa3f49edac1ced1f1031d5133
    SHA-256: 62f039f478216854f4517f8981088ee3a4081ff0e87250f69f3003c0137d2e64
    Size: 251.10 kB
  4. xorg-x11-server-source-1.20.11-33.el9_7.noarch.rpm
    MD5: 50e9005a72c8bad094af3413971edb6c
    SHA-256: 37d12fcada66c9da0d21229dce933a99b2dccdc53c74a2f8f40bc62f9c381206
    Size: 2.37 MB
  5. xorg-x11-server-Xdmx-1.20.11-33.el9_7.x86_64.rpm
    MD5: b08803ed5936f9237162ecef2563b059
    SHA-256: 0ee5d726511eada8c1deb27c60240bae6611b7ab2017de4aae4442a6d2514c8c
    Size: 899.79 kB
  6. xorg-x11-server-Xephyr-1.20.11-33.el9_7.x86_64.rpm
    MD5: 6533232fd674b9742599ddd7cf4a19ad
    SHA-256: 0a76a5d684e1664ade462a8c6d651f220d405b1484d5822e6f83045945edfbdc
    Size: 1.01 MB
  7. xorg-x11-server-Xnest-1.20.11-33.el9_7.x86_64.rpm
    MD5: 3ab1ad08fc6b56331c1b83246a7bc36a
    SHA-256: ea7529c5ec70da9d1f08ebd0926c46bfc6e6739560025a23b6cbf6cb2906b277
    Size: 717.94 kB
  8. xorg-x11-server-Xorg-1.20.11-33.el9_7.x86_64.rpm
    MD5: 1d368098123302d36ad3ae7e8b0da0af
    SHA-256: 5b760dfdb3a87ace75e7f1c81fe9314641172117ca1e9090ca099e2bf3c558f3
    Size: 1.46 MB
  9. xorg-x11-server-Xvfb-1.20.11-33.el9_7.x86_64.rpm
    MD5: 6b75c4a56d62476ab4a1fb9b8a5b569e
    SHA-256: 4e93c8a0b33980c4308f2e9bd06c9f68b6f8e000c23539864fb2e108e05cb9c7
    Size: 894.77 kB