xorg-x11-server-Xwayland-23.2.7-6.el9_7
エラータID: AXSA:2026-543:02
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999)
* xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001)
* xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2026-33999
A flaw was found in the X.Org X server. This integer underflow vulnerability, specifically in the XKB compatibility map handling, allows an attacker with local or remote X11 server access to trigger a buffer read overrun. This can lead to memory-safety violations and potentially a denial of service (DoS) or other severe impacts.
CVE-2026-34001
A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit this without user interaction, leading to a server crash and potentially enabling memory corruption. This could result in a denial of service or further compromise of the system.
CVE-2026-34003
A flaw was found in the X.Org X server's XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible.
Update packages.
A flaw was found in the X.Org X server. This integer underflow vulnerability, specifically in the XKB compatibility map handling, allows an attacker with local or remote X11 server access to trigger a buffer read overrun. This can lead to memory-safety violations and potentially a denial of service (DoS) or other severe impacts.
A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit this without user interaction, leading to a server crash and potentially enabling memory corruption. This could result in a denial of service or further compromise of the system.
A flaw was found in the X.Org X server's XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible.
N/A
SRPMS
- xorg-x11-server-Xwayland-23.2.7-6.el9_7.src.rpm
MD5: d9bec2b6025c3e12db041d2f8c22e37a
SHA-256: 7631f4f69dec5d2ec09551db6cfdaa8979adaab372e6fbd6f432ff13d435d814
Size: 1.28 MB
Asianux Server 9 for x86_64
- xorg-x11-server-Xwayland-23.2.7-6.el9_7.i686.rpm
MD5: 720d1ac1e64f9cd4074a34603defa1fb
SHA-256: 72ed728e3ceedf3af5565d6d9f6ca2579d9ed5c72f7e249182b79d990cc97ea7
Size: 1.01 MB - xorg-x11-server-Xwayland-23.2.7-6.el9_7.x86_64.rpm
MD5: 4aecb0aa955bab69802ef1839c62513c
SHA-256: f8debcf35c58c50d2274b2c52c78c526ea031012ff588d4f5252d0ef31f5a9cf
Size: 0.96 MB - xorg-x11-server-Xwayland-devel-23.2.7-6.el9_7.i686.rpm
MD5: b93047bf1848aeed5739fe1a3cfd1863
SHA-256: 4db13e2c982d7706d11dcb62fd4dce16fe1e36eec08617120f86857783cc91e7
Size: 8.58 kB - xorg-x11-server-Xwayland-devel-23.2.7-6.el9_7.x86_64.rpm
MD5: a17e421517e01f78af7956029d3c530a
SHA-256: b6b3e4fbacdf1c2b43e951639ec49294061119f38d544d4e52c065e52a708263
Size: 8.56 kB