Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-34003 (GCVE-0-2026-34003)
Vulnerability from cvelistv5 – Published: 2026-04-23 14:54 – Updated: 2026-04-29 17:51- CWE-125 - Out-of-bounds Read
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux 10 |
Unaffected:
0:24.1.5-6.el10_1 , < *
(rpm)
cpe:/o:redhat:enterprise_linux:10.1 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-34003",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-23T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-24T03:55:31.996Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10.1"
],
"defaultStatus": "affected",
"packageName": "xorg-x11-server-Xwayland",
"product": "Red Hat Enterprise Linux 10",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:24.1.5-6.el10_1",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:8::appstream"
],
"defaultStatus": "affected",
"packageName": "xorg-x11-server-Xwayland",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:21.1.3-20.el8_10",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
],
"defaultStatus": "affected",
"packageName": "xorg-x11-server",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.20.11-28.el8_10",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:9::appstream"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.15.0-6.el9_7.1",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
],
"defaultStatus": "affected",
"packageName": "xorg-x11-server-Xwayland",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:23.2.7-6.el9_7",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
],
"defaultStatus": "affected",
"packageName": "xorg-x11-server",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.20.11-33.el9_7",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:6"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 6",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:6"
],
"defaultStatus": "unknown",
"packageName": "xorg-x11-server",
"product": "Red Hat Enterprise Linux 6",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:7"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 7",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:7"
],
"defaultStatus": "affected",
"packageName": "xorg-x11-server",
"product": "Red Hat Enterprise Linux 7",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat"
}
],
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Jan-Niklas Sohn (TrendAI Zero Day Initiative) for reporting this issue."
}
],
"datePublic": "2026-04-23T14:18:00.653Z",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the X.Org X server\u0027s XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible."
}
],
"metrics": [
{
"other": {
"content": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"value": "Important"
},
"type": "Red Hat severity rating"
}
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-125",
"description": "Out-of-bounds Read",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-29T17:51:36.608Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2026:10739",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:10739"
},
{
"name": "RHSA-2026:11352",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:11352"
},
{
"name": "RHSA-2026:11369",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:11369"
},
{
"name": "RHSA-2026:11388",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:11388"
},
{
"name": "RHSA-2026:11656",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:11656"
},
{
"name": "RHSA-2026:11692",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:11692"
},
{
"tags": [
"vdb-entry",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/security/cve/CVE-2026-34003"
},
{
"name": "RHBZ#2451113",
"tags": [
"issue-tracking",
"x_refsource_REDHAT"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451113"
}
],
"timeline": [
{
"lang": "en",
"time": "2026-03-25T07:19:13.949Z",
"value": "Reported to Red Hat."
},
{
"lang": "en",
"time": "2026-04-23T14:18:00.653Z",
"value": "Made public."
}
],
"title": "Xorg: xwayland: x.org x server: information exposure and denial of service via out-of-bounds memory access",
"workarounds": [
{
"lang": "en",
"value": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability."
}
],
"x_generator": {
"engine": "cvelib 1.8.0"
},
"x_redhatCweChain": "CWE-125: Out-of-bounds Read"
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2026-34003",
"datePublished": "2026-04-23T14:54:05.479Z",
"dateReserved": "2026-03-25T04:53:13.615Z",
"dateUpdated": "2026-04-29T17:51:36.608Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-34003",
"date": "2026-04-30",
"epss": "0.00012",
"percentile": "0.01928"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-34003\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2026-04-23T16:16:24.920\",\"lastModified\":\"2026-04-29T19:16:23.640\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in the X.Org X server\u0027s XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2026:10739\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:11352\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:11369\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:11388\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:11656\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:11692\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2026-34003\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2451113\",\"source\":\"secalert@redhat.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-34003\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-04-23T17:20:40.546545Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-04-23T17:20:44.391Z\"}}], \"cna\": {\"title\": \"Xorg: xwayland: x.org x server: information exposure and denial of service via out-of-bounds memory access\", \"credits\": [{\"lang\": \"en\", \"value\": \"Red Hat would like to thank Jan-Niklas Sohn (TrendAI Zero Day Initiative) for reporting this issue.\"}], \"metrics\": [{\"other\": {\"type\": \"Red Hat severity rating\", \"content\": {\"value\": \"Important\", \"namespace\": \"https://access.redhat.com/security/updates/classification/\"}}}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10.1\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:24.1.5-6.el10_1\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"xorg-x11-server-Xwayland\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:8::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:21.1.3-20.el8_10\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"xorg-x11-server-Xwayland\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:8::appstream\", \"cpe:/a:redhat:enterprise_linux:8::crb\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.20.11-28.el8_10\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"xorg-x11-server\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:9::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.15.0-6.el9_7.1\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:9::appstream\", \"cpe:/a:redhat:enterprise_linux:9::crb\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:23.2.7-6.el9_7\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"xorg-x11-server-Xwayland\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:9::appstream\", \"cpe:/a:redhat:enterprise_linux:9::crb\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.20.11-33.el9_7\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"xorg-x11-server\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:6\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 6\", \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:6\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 6\", \"packageName\": \"xorg-x11-server\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:7\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 7\", \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:7\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 7\", \"packageName\": \"xorg-x11-server\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2026-03-25T07:19:13.949Z\", \"value\": \"Reported to Red Hat.\"}, {\"lang\": \"en\", \"time\": \"2026-04-23T14:18:00.653Z\", \"value\": \"Made public.\"}], \"datePublic\": \"2026-04-23T14:18:00.653Z\", \"references\": [{\"url\": \"https://access.redhat.com/errata/RHSA-2026:10739\", \"name\": \"RHSA-2026:10739\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:11352\", \"name\": \"RHSA-2026:11352\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:11369\", \"name\": \"RHSA-2026:11369\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:11388\", \"name\": \"RHSA-2026:11388\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:11656\", \"name\": \"RHSA-2026:11656\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:11692\", \"name\": \"RHSA-2026:11692\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2026-34003\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2451113\", \"name\": \"RHBZ#2451113\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.\"}], \"x_generator\": {\"engine\": \"cvelib 1.8.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A flaw was found in the X.Org X server\u0027s XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-125\", \"description\": \"Out-of-bounds Read\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2026-04-29T17:51:36.608Z\"}, \"x_redhatCweChain\": \"CWE-125: Out-of-bounds Read\"}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-34003\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-29T17:51:36.608Z\", \"dateReserved\": \"2026-03-25T04:53:13.615Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2026-04-23T14:54:05.479Z\", \"assignerShortName\": \"redhat\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
SUSE-SU-2026:21211-1
Vulnerability from csaf_suse - Published: 2026-04-17 07:57 - Updated: 2026-04-17 07:57{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xwayland",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xwayland fixes the following issues:\n\n- CVE-2026-33999: XKB Integer Underflow in XkbSetCompatMap() (bsc#1260922).\n- CVE-2026-34000: XKB Out-of-bounds Read in CheckSetGeom() (bsc#1260923).\n- CVE-2026-34001: XSYNC Use-after-free in miSyncTriggerFence() (bsc#1260924).\n- CVE-2026-34002: XKB Out-of-bounds read in CheckModifierMap() (bsc#1260925).\n- CVE-2026-34003: XKB Buffer overflow in CheckKeyTypes() (bsc#1260926).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-583",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_21211-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:21211-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202621211-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:21211-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025518.html"
},
{
"category": "self",
"summary": "SUSE Bug 1260922",
"url": "https://bugzilla.suse.com/1260922"
},
{
"category": "self",
"summary": "SUSE Bug 1260923",
"url": "https://bugzilla.suse.com/1260923"
},
{
"category": "self",
"summary": "SUSE Bug 1260924",
"url": "https://bugzilla.suse.com/1260924"
},
{
"category": "self",
"summary": "SUSE Bug 1260925",
"url": "https://bugzilla.suse.com/1260925"
},
{
"category": "self",
"summary": "SUSE Bug 1260926",
"url": "https://bugzilla.suse.com/1260926"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-33999 page",
"url": "https://www.suse.com/security/cve/CVE-2026-33999/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34000 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34000/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34001 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34002 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34002/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34003 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34003/"
}
],
"title": "Security update for xwayland",
"tracking": {
"current_release_date": "2026-04-17T07:57:47Z",
"generator": {
"date": "2026-04-17T07:57:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:21211-1",
"initial_release_date": "2026-04-17T07:57:47Z",
"revision_history": [
{
"date": "2026-04-17T07:57:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.6-160000.4.1.aarch64",
"product": {
"name": "xwayland-24.1.6-160000.4.1.aarch64",
"product_id": "xwayland-24.1.6-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.6-160000.4.1.aarch64",
"product": {
"name": "xwayland-devel-24.1.6-160000.4.1.aarch64",
"product_id": "xwayland-devel-24.1.6-160000.4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.6-160000.4.1.ppc64le",
"product": {
"name": "xwayland-24.1.6-160000.4.1.ppc64le",
"product_id": "xwayland-24.1.6-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.6-160000.4.1.ppc64le",
"product": {
"name": "xwayland-devel-24.1.6-160000.4.1.ppc64le",
"product_id": "xwayland-devel-24.1.6-160000.4.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.6-160000.4.1.s390x",
"product": {
"name": "xwayland-24.1.6-160000.4.1.s390x",
"product_id": "xwayland-24.1.6-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.6-160000.4.1.s390x",
"product": {
"name": "xwayland-devel-24.1.6-160000.4.1.s390x",
"product_id": "xwayland-devel-24.1.6-160000.4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.6-160000.4.1.x86_64",
"product": {
"name": "xwayland-24.1.6-160000.4.1.x86_64",
"product_id": "xwayland-24.1.6-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.6-160000.4.1.x86_64",
"product": {
"name": "xwayland-devel-24.1.6-160000.4.1.x86_64",
"product_id": "xwayland-devel-24.1.6-160000.4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server-sap"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-24.1.6-160000.4.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.aarch64"
},
"product_reference": "xwayland-24.1.6-160000.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-24.1.6-160000.4.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.ppc64le"
},
"product_reference": "xwayland-24.1.6-160000.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-24.1.6-160000.4.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.s390x"
},
"product_reference": "xwayland-24.1.6-160000.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-24.1.6-160000.4.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.x86_64"
},
"product_reference": "xwayland-24.1.6-160000.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-24.1.6-160000.4.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64"
},
"product_reference": "xwayland-devel-24.1.6-160000.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-24.1.6-160000.4.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le"
},
"product_reference": "xwayland-devel-24.1.6-160000.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-24.1.6-160000.4.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.s390x"
},
"product_reference": "xwayland-devel-24.1.6-160000.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-24.1.6-160000.4.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64"
},
"product_reference": "xwayland-devel-24.1.6-160000.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-24.1.6-160000.4.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.aarch64"
},
"product_reference": "xwayland-24.1.6-160000.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-24.1.6-160000.4.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.ppc64le"
},
"product_reference": "xwayland-24.1.6-160000.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-24.1.6-160000.4.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.s390x"
},
"product_reference": "xwayland-24.1.6-160000.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-24.1.6-160000.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.x86_64"
},
"product_reference": "xwayland-24.1.6-160000.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-24.1.6-160000.4.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64"
},
"product_reference": "xwayland-devel-24.1.6-160000.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-24.1.6-160000.4.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le"
},
"product_reference": "xwayland-devel-24.1.6-160000.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-24.1.6-160000.4.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.s390x"
},
"product_reference": "xwayland-devel-24.1.6-160000.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-24.1.6-160000.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64"
},
"product_reference": "xwayland-devel-24.1.6-160000.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-33999",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-33999"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-33999",
"url": "https://www.suse.com/security/cve/CVE-2026-33999"
},
{
"category": "external",
"summary": "SUSE Bug 1260922 for CVE-2026-33999",
"url": "https://bugzilla.suse.com/1260922"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-17T07:57:47Z",
"details": "moderate"
}
],
"title": "CVE-2026-33999"
},
{
"cve": "CVE-2026-34000",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34000"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34000",
"url": "https://www.suse.com/security/cve/CVE-2026-34000"
},
{
"category": "external",
"summary": "SUSE Bug 1260923 for CVE-2026-34000",
"url": "https://bugzilla.suse.com/1260923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-17T07:57:47Z",
"details": "moderate"
}
],
"title": "CVE-2026-34000"
},
{
"cve": "CVE-2026-34001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34001"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34001",
"url": "https://www.suse.com/security/cve/CVE-2026-34001"
},
{
"category": "external",
"summary": "SUSE Bug 1260924 for CVE-2026-34001",
"url": "https://bugzilla.suse.com/1260924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-17T07:57:47Z",
"details": "important"
}
],
"title": "CVE-2026-34001"
},
{
"cve": "CVE-2026-34002",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34002"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34002",
"url": "https://www.suse.com/security/cve/CVE-2026-34002"
},
{
"category": "external",
"summary": "SUSE Bug 1260925 for CVE-2026-34002",
"url": "https://bugzilla.suse.com/1260925"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-17T07:57:47Z",
"details": "moderate"
}
],
"title": "CVE-2026-34002"
},
{
"cve": "CVE-2026-34003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34003"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34003",
"url": "https://www.suse.com/security/cve/CVE-2026-34003"
},
{
"category": "external",
"summary": "SUSE Bug 1260926 for CVE-2026-34003",
"url": "https://bugzilla.suse.com/1260926"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-24.1.6-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:xwayland-devel-24.1.6-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-17T07:57:47Z",
"details": "moderate"
}
],
"title": "CVE-2026-34003"
}
]
}
SUSE-SU-2026:1331-1
Vulnerability from csaf_suse - Published: 2026-04-14 17:11 - Updated: 2026-04-14 17:11| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xorg-x11-server",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xorg-x11-server fixes the following issues:\n\n- CVE-2026-33999: XKB integer underflow in XkbSetCompatMap() (bsc#1260922).\n- CVE-2026-34000: XKB out-of-bounds read in CheckSetGeom() (bsc#1260923).\n- CVE-2026-34001: XSYNC use-after-free in miSyncTriggerFence() (bsc#1260924).\n- CVE-2026-34002: XKB out-of-bounds read in CheckModifierMap() (bsc#1260925).\n- CVE-2026-34003: XKB buffer overflow in CheckKeyTypes() (bsc#1260926).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1331,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1331,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1331,openSUSE-SLE-15.6-2026-1331",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1331-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1331-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261331-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1331-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-April/045534.html"
},
{
"category": "self",
"summary": "SUSE Bug 1260922",
"url": "https://bugzilla.suse.com/1260922"
},
{
"category": "self",
"summary": "SUSE Bug 1260923",
"url": "https://bugzilla.suse.com/1260923"
},
{
"category": "self",
"summary": "SUSE Bug 1260924",
"url": "https://bugzilla.suse.com/1260924"
},
{
"category": "self",
"summary": "SUSE Bug 1260925",
"url": "https://bugzilla.suse.com/1260925"
},
{
"category": "self",
"summary": "SUSE Bug 1260926",
"url": "https://bugzilla.suse.com/1260926"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-33999 page",
"url": "https://www.suse.com/security/cve/CVE-2026-33999/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34000 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34000/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34001 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34002 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34002/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34003 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34003/"
}
],
"title": "Security update for xorg-x11-server",
"tracking": {
"current_release_date": "2026-04-14T17:11:37Z",
"generator": {
"date": "2026-04-14T17:11:37Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1331-1",
"initial_release_date": "2026-04-14T17:11:37Z",
"revision_history": [
{
"date": "2026-04-14T17:11:37Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"product": {
"name": "xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"product_id": "xorg-x11-server-21.1.11-150600.5.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"product_id": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"product": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"product_id": "xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"product": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"product_id": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.11-150600.5.25.1.aarch64",
"product": {
"name": "xorg-x11-server-source-21.1.11-150600.5.25.1.aarch64",
"product_id": "xorg-x11-server-source-21.1.11-150600.5.25.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.11-150600.5.25.1.i586",
"product": {
"name": "xorg-x11-server-21.1.11-150600.5.25.1.i586",
"product_id": "xorg-x11-server-21.1.11-150600.5.25.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.i586",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.i586",
"product_id": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.11-150600.5.25.1.i586",
"product": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.25.1.i586",
"product_id": "xorg-x11-server-extra-21.1.11-150600.5.25.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.i586",
"product": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.i586",
"product_id": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.11-150600.5.25.1.i586",
"product": {
"name": "xorg-x11-server-source-21.1.11-150600.5.25.1.i586",
"product_id": "xorg-x11-server-source-21.1.11-150600.5.25.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"product": {
"name": "xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"product_id": "xorg-x11-server-21.1.11-150600.5.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"product_id": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"product": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"product_id": "xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"product": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"product_id": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.11-150600.5.25.1.ppc64le",
"product": {
"name": "xorg-x11-server-source-21.1.11-150600.5.25.1.ppc64le",
"product_id": "xorg-x11-server-source-21.1.11-150600.5.25.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"product": {
"name": "xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"product_id": "xorg-x11-server-21.1.11-150600.5.25.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"product_id": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"product": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"product_id": "xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"product": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"product_id": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.11-150600.5.25.1.s390x",
"product": {
"name": "xorg-x11-server-source-21.1.11-150600.5.25.1.s390x",
"product_id": "xorg-x11-server-source-21.1.11-150600.5.25.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"product": {
"name": "xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"product_id": "xorg-x11-server-21.1.11-150600.5.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"product_id": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"product": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"product_id": "xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"product": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"product_id": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.11-150600.5.25.1.x86_64",
"product": {
"name": "xorg-x11-server-source-21.1.11-150600.5.25.1.x86_64",
"product_id": "xorg-x11-server-source-21.1.11-150600.5.25.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.11-150600.5.25.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.aarch64"
},
"product_reference": "xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.11-150600.5.25.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le"
},
"product_reference": "xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.11-150600.5.25.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.s390x"
},
"product_reference": "xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.11-150600.5.25.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.x86_64"
},
"product_reference": "xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x"
},
"product_reference": "xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x"
},
"product_reference": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.11-150600.5.25.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le"
},
"product_reference": "xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.11-150600.5.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64"
},
"product_reference": "xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.11-150600.5.25.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.aarch64"
},
"product_reference": "xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.11-150600.5.25.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le"
},
"product_reference": "xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.11-150600.5.25.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.s390x"
},
"product_reference": "xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.11-150600.5.25.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64"
},
"product_reference": "xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x"
},
"product_reference": "xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x"
},
"product_reference": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-21.1.11-150600.5.25.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.aarch64"
},
"product_reference": "xorg-x11-server-source-21.1.11-150600.5.25.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-21.1.11-150600.5.25.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.ppc64le"
},
"product_reference": "xorg-x11-server-source-21.1.11-150600.5.25.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-21.1.11-150600.5.25.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.s390x"
},
"product_reference": "xorg-x11-server-source-21.1.11-150600.5.25.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-21.1.11-150600.5.25.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.x86_64"
},
"product_reference": "xorg-x11-server-source-21.1.11-150600.5.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-33999",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-33999"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-33999",
"url": "https://www.suse.com/security/cve/CVE-2026-33999"
},
{
"category": "external",
"summary": "SUSE Bug 1260922 for CVE-2026-33999",
"url": "https://bugzilla.suse.com/1260922"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:11:37Z",
"details": "moderate"
}
],
"title": "CVE-2026-33999"
},
{
"cve": "CVE-2026-34000",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34000"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34000",
"url": "https://www.suse.com/security/cve/CVE-2026-34000"
},
{
"category": "external",
"summary": "SUSE Bug 1260923 for CVE-2026-34000",
"url": "https://bugzilla.suse.com/1260923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:11:37Z",
"details": "moderate"
}
],
"title": "CVE-2026-34000"
},
{
"cve": "CVE-2026-34001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34001"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34001",
"url": "https://www.suse.com/security/cve/CVE-2026-34001"
},
{
"category": "external",
"summary": "SUSE Bug 1260924 for CVE-2026-34001",
"url": "https://bugzilla.suse.com/1260924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:11:37Z",
"details": "important"
}
],
"title": "CVE-2026-34001"
},
{
"cve": "CVE-2026-34002",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34002"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34002",
"url": "https://www.suse.com/security/cve/CVE-2026-34002"
},
{
"category": "external",
"summary": "SUSE Bug 1260925 for CVE-2026-34002",
"url": "https://bugzilla.suse.com/1260925"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:11:37Z",
"details": "moderate"
}
],
"title": "CVE-2026-34002"
},
{
"cve": "CVE-2026-34003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34003"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34003",
"url": "https://www.suse.com/security/cve/CVE-2026-34003"
},
{
"category": "external",
"summary": "SUSE Bug 1260926 for CVE-2026-34003",
"url": "https://bugzilla.suse.com/1260926"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-Xvfb-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-extra-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-sdk-21.1.11-150600.5.25.1.x86_64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.aarch64",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.ppc64le",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.s390x",
"openSUSE Leap 15.6:xorg-x11-server-source-21.1.11-150600.5.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:11:37Z",
"details": "moderate"
}
],
"title": "CVE-2026-34003"
}
]
}
SUSE-SU-2026:1333-1
Vulnerability from csaf_suse - Published: 2026-04-14 17:18 - Updated: 2026-04-14 17:18| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xorg-x11-server",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xorg-x11-server fixes the following issues:\n\n- CVE-2026-33999: XKB integer underflow in XkbSetCompatMap() (bsc#1260922).\n- CVE-2026-34000: XKB out-of-bounds read in CheckSetGeom() (bsc#1260923).\n- CVE-2026-34001: XSYNC use-after-free in miSyncTriggerFence() (bsc#1260924).\n- CVE-2026-34002: XKB out-of-bounds read in CheckModifierMap() (bsc#1260925).\n- CVE-2026-34003: XKB buffer overflow in CheckKeyTypes() (bsc#1260926).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1333,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1333,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1333,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1333,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1333",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1333-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1333-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261333-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1333-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-April/045532.html"
},
{
"category": "self",
"summary": "SUSE Bug 1260922",
"url": "https://bugzilla.suse.com/1260922"
},
{
"category": "self",
"summary": "SUSE Bug 1260923",
"url": "https://bugzilla.suse.com/1260923"
},
{
"category": "self",
"summary": "SUSE Bug 1260924",
"url": "https://bugzilla.suse.com/1260924"
},
{
"category": "self",
"summary": "SUSE Bug 1260925",
"url": "https://bugzilla.suse.com/1260925"
},
{
"category": "self",
"summary": "SUSE Bug 1260926",
"url": "https://bugzilla.suse.com/1260926"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-33999 page",
"url": "https://www.suse.com/security/cve/CVE-2026-33999/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34000 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34000/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34001 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34002 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34002/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34003 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34003/"
}
],
"title": "Security update for xorg-x11-server",
"tracking": {
"current_release_date": "2026-04-14T17:18:59Z",
"generator": {
"date": "2026-04-14T17:18:59Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1333-1",
"initial_release_date": "2026-04-14T17:18:59Z",
"revision_history": [
{
"date": "2026-04-14T17:18:59Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"product": {
"name": "xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"product_id": "xorg-x11-server-1.20.3-150400.38.68.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"product": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"product_id": "xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"product": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"product_id": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.20.3-150400.38.68.1.aarch64",
"product": {
"name": "xorg-x11-server-source-1.20.3-150400.38.68.1.aarch64",
"product_id": "xorg-x11-server-source-1.20.3-150400.38.68.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.20.3-150400.38.68.1.i586",
"product": {
"name": "xorg-x11-server-1.20.3-150400.38.68.1.i586",
"product_id": "xorg-x11-server-1.20.3-150400.38.68.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.20.3-150400.38.68.1.i586",
"product": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.68.1.i586",
"product_id": "xorg-x11-server-extra-1.20.3-150400.38.68.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.i586",
"product": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.i586",
"product_id": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.20.3-150400.38.68.1.i586",
"product": {
"name": "xorg-x11-server-source-1.20.3-150400.38.68.1.i586",
"product_id": "xorg-x11-server-source-1.20.3-150400.38.68.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"product": {
"name": "xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"product_id": "xorg-x11-server-1.20.3-150400.38.68.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"product": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"product_id": "xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"product": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"product_id": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.20.3-150400.38.68.1.ppc64le",
"product": {
"name": "xorg-x11-server-source-1.20.3-150400.38.68.1.ppc64le",
"product_id": "xorg-x11-server-source-1.20.3-150400.38.68.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.20.3-150400.38.68.1.s390x",
"product": {
"name": "xorg-x11-server-1.20.3-150400.38.68.1.s390x",
"product_id": "xorg-x11-server-1.20.3-150400.38.68.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.20.3-150400.38.68.1.s390x",
"product": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.68.1.s390x",
"product_id": "xorg-x11-server-extra-1.20.3-150400.38.68.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.s390x",
"product": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.s390x",
"product_id": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.20.3-150400.38.68.1.s390x",
"product": {
"name": "xorg-x11-server-source-1.20.3-150400.38.68.1.s390x",
"product_id": "xorg-x11-server-source-1.20.3-150400.38.68.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"product": {
"name": "xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"product_id": "xorg-x11-server-1.20.3-150400.38.68.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"product": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"product_id": "xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"product": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"product_id": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.20.3-150400.38.68.1.x86_64",
"product": {
"name": "xorg-x11-server-source-1.20.3-150400.38.68.1.x86_64",
"product_id": "xorg-x11-server-source-1.20.3-150400.38.68.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.68.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.68.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.68.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.68.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.68.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.68.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.68.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.s390x"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.68.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.68.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.68.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.s390x"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.68.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.s390x"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.68.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-33999",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-33999"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-33999",
"url": "https://www.suse.com/security/cve/CVE-2026-33999"
},
{
"category": "external",
"summary": "SUSE Bug 1260922 for CVE-2026-33999",
"url": "https://bugzilla.suse.com/1260922"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:18:59Z",
"details": "moderate"
}
],
"title": "CVE-2026-33999"
},
{
"cve": "CVE-2026-34000",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34000"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34000",
"url": "https://www.suse.com/security/cve/CVE-2026-34000"
},
{
"category": "external",
"summary": "SUSE Bug 1260923 for CVE-2026-34000",
"url": "https://bugzilla.suse.com/1260923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:18:59Z",
"details": "moderate"
}
],
"title": "CVE-2026-34000"
},
{
"cve": "CVE-2026-34001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34001"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34001",
"url": "https://www.suse.com/security/cve/CVE-2026-34001"
},
{
"category": "external",
"summary": "SUSE Bug 1260924 for CVE-2026-34001",
"url": "https://bugzilla.suse.com/1260924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:18:59Z",
"details": "important"
}
],
"title": "CVE-2026-34001"
},
{
"cve": "CVE-2026-34002",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34002"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34002",
"url": "https://www.suse.com/security/cve/CVE-2026-34002"
},
{
"category": "external",
"summary": "SUSE Bug 1260925 for CVE-2026-34002",
"url": "https://bugzilla.suse.com/1260925"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:18:59Z",
"details": "moderate"
}
],
"title": "CVE-2026-34002"
},
{
"cve": "CVE-2026-34003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34003"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34003",
"url": "https://www.suse.com/security/cve/CVE-2026-34003"
},
{
"category": "external",
"summary": "SUSE Bug 1260926 for CVE-2026-34003",
"url": "https://bugzilla.suse.com/1260926"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.68.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.68.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:18:59Z",
"details": "moderate"
}
],
"title": "CVE-2026-34003"
}
]
}
SUSE-SU-2026:1330-1
Vulnerability from csaf_suse - Published: 2026-04-14 17:08 - Updated: 2026-04-14 17:08| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xorg-x11-server",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xorg-x11-server fixes the following issues:\n\n- CVE-2026-33999: XKB Integer Underflow in XkbSetCompatMap() (bsc#1260922).\n- CVE-2026-34000: XKB Out-of-bounds Read in CheckSetGeom() (bsc#1260923).\n- CVE-2026-34001: XSYNC Use-after-free in miSyncTriggerFence() (bsc#1260924).\n- CVE-2026-34002: XKB Out-of-bounds read in CheckModifierMap() (bsc#1260925).\n- CVE-2026-34003: XKB Buffer overflow in CheckKeyTypes() (bsc#1260926).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1330,SUSE-SLE-Module-Basesystem-15-SP7-2026-1330,SUSE-SLE-Module-Development-Tools-15-SP7-2026-1330",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1330-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1330-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261330-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1330-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-April/045535.html"
},
{
"category": "self",
"summary": "SUSE Bug 1260922",
"url": "https://bugzilla.suse.com/1260922"
},
{
"category": "self",
"summary": "SUSE Bug 1260923",
"url": "https://bugzilla.suse.com/1260923"
},
{
"category": "self",
"summary": "SUSE Bug 1260924",
"url": "https://bugzilla.suse.com/1260924"
},
{
"category": "self",
"summary": "SUSE Bug 1260925",
"url": "https://bugzilla.suse.com/1260925"
},
{
"category": "self",
"summary": "SUSE Bug 1260926",
"url": "https://bugzilla.suse.com/1260926"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-33999 page",
"url": "https://www.suse.com/security/cve/CVE-2026-33999/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34000 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34000/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34001 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34002 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34002/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34003 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34003/"
}
],
"title": "Security update for xorg-x11-server",
"tracking": {
"current_release_date": "2026-04-14T17:08:59Z",
"generator": {
"date": "2026-04-14T17:08:59Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1330-1",
"initial_release_date": "2026-04-14T17:08:59Z",
"revision_history": [
{
"date": "2026-04-14T17:08:59Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.15-150700.5.16.1.aarch64",
"product": {
"name": "xorg-x11-server-21.1.15-150700.5.16.1.aarch64",
"product_id": "xorg-x11-server-21.1.15-150700.5.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.aarch64",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.aarch64",
"product_id": "xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.15-150700.5.16.1.aarch64",
"product": {
"name": "xorg-x11-server-extra-21.1.15-150700.5.16.1.aarch64",
"product_id": "xorg-x11-server-extra-21.1.15-150700.5.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.15-150700.5.16.1.aarch64",
"product": {
"name": "xorg-x11-server-sdk-21.1.15-150700.5.16.1.aarch64",
"product_id": "xorg-x11-server-sdk-21.1.15-150700.5.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.15-150700.5.16.1.aarch64",
"product": {
"name": "xorg-x11-server-source-21.1.15-150700.5.16.1.aarch64",
"product_id": "xorg-x11-server-source-21.1.15-150700.5.16.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.15-150700.5.16.1.i586",
"product": {
"name": "xorg-x11-server-21.1.15-150700.5.16.1.i586",
"product_id": "xorg-x11-server-21.1.15-150700.5.16.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.i586",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.i586",
"product_id": "xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.15-150700.5.16.1.i586",
"product": {
"name": "xorg-x11-server-extra-21.1.15-150700.5.16.1.i586",
"product_id": "xorg-x11-server-extra-21.1.15-150700.5.16.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.15-150700.5.16.1.i586",
"product": {
"name": "xorg-x11-server-sdk-21.1.15-150700.5.16.1.i586",
"product_id": "xorg-x11-server-sdk-21.1.15-150700.5.16.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.15-150700.5.16.1.i586",
"product": {
"name": "xorg-x11-server-source-21.1.15-150700.5.16.1.i586",
"product_id": "xorg-x11-server-source-21.1.15-150700.5.16.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.15-150700.5.16.1.ppc64le",
"product": {
"name": "xorg-x11-server-21.1.15-150700.5.16.1.ppc64le",
"product_id": "xorg-x11-server-21.1.15-150700.5.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.ppc64le",
"product_id": "xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.15-150700.5.16.1.ppc64le",
"product": {
"name": "xorg-x11-server-extra-21.1.15-150700.5.16.1.ppc64le",
"product_id": "xorg-x11-server-extra-21.1.15-150700.5.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.15-150700.5.16.1.ppc64le",
"product": {
"name": "xorg-x11-server-sdk-21.1.15-150700.5.16.1.ppc64le",
"product_id": "xorg-x11-server-sdk-21.1.15-150700.5.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.15-150700.5.16.1.ppc64le",
"product": {
"name": "xorg-x11-server-source-21.1.15-150700.5.16.1.ppc64le",
"product_id": "xorg-x11-server-source-21.1.15-150700.5.16.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.15-150700.5.16.1.s390x",
"product": {
"name": "xorg-x11-server-21.1.15-150700.5.16.1.s390x",
"product_id": "xorg-x11-server-21.1.15-150700.5.16.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.s390x",
"product_id": "xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.15-150700.5.16.1.s390x",
"product": {
"name": "xorg-x11-server-extra-21.1.15-150700.5.16.1.s390x",
"product_id": "xorg-x11-server-extra-21.1.15-150700.5.16.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.15-150700.5.16.1.s390x",
"product": {
"name": "xorg-x11-server-sdk-21.1.15-150700.5.16.1.s390x",
"product_id": "xorg-x11-server-sdk-21.1.15-150700.5.16.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.15-150700.5.16.1.s390x",
"product": {
"name": "xorg-x11-server-source-21.1.15-150700.5.16.1.s390x",
"product_id": "xorg-x11-server-source-21.1.15-150700.5.16.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.15-150700.5.16.1.x86_64",
"product": {
"name": "xorg-x11-server-21.1.15-150700.5.16.1.x86_64",
"product_id": "xorg-x11-server-21.1.15-150700.5.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.x86_64",
"product_id": "xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.15-150700.5.16.1.x86_64",
"product": {
"name": "xorg-x11-server-extra-21.1.15-150700.5.16.1.x86_64",
"product_id": "xorg-x11-server-extra-21.1.15-150700.5.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.15-150700.5.16.1.x86_64",
"product": {
"name": "xorg-x11-server-sdk-21.1.15-150700.5.16.1.x86_64",
"product_id": "xorg-x11-server-sdk-21.1.15-150700.5.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.15-150700.5.16.1.x86_64",
"product": {
"name": "xorg-x11-server-source-21.1.15-150700.5.16.1.x86_64",
"product_id": "xorg-x11-server-source-21.1.15-150700.5.16.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.15-150700.5.16.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.aarch64"
},
"product_reference": "xorg-x11-server-21.1.15-150700.5.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.15-150700.5.16.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.ppc64le"
},
"product_reference": "xorg-x11-server-21.1.15-150700.5.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.15-150700.5.16.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.s390x"
},
"product_reference": "xorg-x11-server-21.1.15-150700.5.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.15-150700.5.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.x86_64"
},
"product_reference": "xorg-x11-server-21.1.15-150700.5.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.15-150700.5.16.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-21.1.15-150700.5.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.15-150700.5.16.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-21.1.15-150700.5.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.15-150700.5.16.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.s390x"
},
"product_reference": "xorg-x11-server-extra-21.1.15-150700.5.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.15-150700.5.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-21.1.15-150700.5.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.15-150700.5.16.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-21.1.15-150700.5.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.15-150700.5.16.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-21.1.15-150700.5.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.15-150700.5.16.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.s390x"
},
"product_reference": "xorg-x11-server-sdk-21.1.15-150700.5.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.15-150700.5.16.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-21.1.15-150700.5.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-33999",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-33999"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-33999",
"url": "https://www.suse.com/security/cve/CVE-2026-33999"
},
{
"category": "external",
"summary": "SUSE Bug 1260922 for CVE-2026-33999",
"url": "https://bugzilla.suse.com/1260922"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:08:59Z",
"details": "moderate"
}
],
"title": "CVE-2026-33999"
},
{
"cve": "CVE-2026-34000",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34000"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34000",
"url": "https://www.suse.com/security/cve/CVE-2026-34000"
},
{
"category": "external",
"summary": "SUSE Bug 1260923 for CVE-2026-34000",
"url": "https://bugzilla.suse.com/1260923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:08:59Z",
"details": "moderate"
}
],
"title": "CVE-2026-34000"
},
{
"cve": "CVE-2026-34001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34001"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34001",
"url": "https://www.suse.com/security/cve/CVE-2026-34001"
},
{
"category": "external",
"summary": "SUSE Bug 1260924 for CVE-2026-34001",
"url": "https://bugzilla.suse.com/1260924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:08:59Z",
"details": "important"
}
],
"title": "CVE-2026-34001"
},
{
"cve": "CVE-2026-34002",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34002"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34002",
"url": "https://www.suse.com/security/cve/CVE-2026-34002"
},
{
"category": "external",
"summary": "SUSE Bug 1260925 for CVE-2026-34002",
"url": "https://bugzilla.suse.com/1260925"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:08:59Z",
"details": "moderate"
}
],
"title": "CVE-2026-34002"
},
{
"cve": "CVE-2026-34003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34003"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34003",
"url": "https://www.suse.com/security/cve/CVE-2026-34003"
},
{
"category": "external",
"summary": "SUSE Bug 1260926 for CVE-2026-34003",
"url": "https://bugzilla.suse.com/1260926"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-Xvfb-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:xorg-x11-server-extra-21.1.15-150700.5.16.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:xorg-x11-server-sdk-21.1.15-150700.5.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:08:59Z",
"details": "moderate"
}
],
"title": "CVE-2026-34003"
}
]
}
SUSE-SU-2026:1329-1
Vulnerability from csaf_suse - Published: 2026-04-14 17:06 - Updated: 2026-04-14 17:06| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xwayland",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xwayland fixes the following issues:\n\n- CVE-2026-33999: XKB integer underflow in XkbSetCompatMap() (bsc#1260922).\n- CVE-2026-34000: XKB out-of-bounds read in CheckSetGeom() (bsc#1260923).\n- CVE-2026-34001: XSYNC use-after-free in miSyncTriggerFence() (bsc#1260924).\n- CVE-2026-34002: XKB out-of-bounds read in CheckModifierMap() (bsc#1260925).\n- CVE-2026-34003: XKB buffer overflow in CheckKeyTypes() (bsc#1260926).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1329,openSUSE-SLE-15.6-2026-1329",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1329-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1329-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261329-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1329-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-April/045536.html"
},
{
"category": "self",
"summary": "SUSE Bug 1260922",
"url": "https://bugzilla.suse.com/1260922"
},
{
"category": "self",
"summary": "SUSE Bug 1260923",
"url": "https://bugzilla.suse.com/1260923"
},
{
"category": "self",
"summary": "SUSE Bug 1260924",
"url": "https://bugzilla.suse.com/1260924"
},
{
"category": "self",
"summary": "SUSE Bug 1260925",
"url": "https://bugzilla.suse.com/1260925"
},
{
"category": "self",
"summary": "SUSE Bug 1260926",
"url": "https://bugzilla.suse.com/1260926"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-33999 page",
"url": "https://www.suse.com/security/cve/CVE-2026-33999/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34000 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34000/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34001 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34002 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34002/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34003 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34003/"
}
],
"title": "Security update for xwayland",
"tracking": {
"current_release_date": "2026-04-14T17:06:20Z",
"generator": {
"date": "2026-04-14T17:06:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1329-1",
"initial_release_date": "2026-04-14T17:06:20Z",
"revision_history": [
{
"date": "2026-04-14T17:06:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.1-150600.5.23.1.aarch64",
"product": {
"name": "xwayland-24.1.1-150600.5.23.1.aarch64",
"product_id": "xwayland-24.1.1-150600.5.23.1.aarch64"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.1-150600.5.23.1.aarch64",
"product": {
"name": "xwayland-devel-24.1.1-150600.5.23.1.aarch64",
"product_id": "xwayland-devel-24.1.1-150600.5.23.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.1-150600.5.23.1.i586",
"product": {
"name": "xwayland-24.1.1-150600.5.23.1.i586",
"product_id": "xwayland-24.1.1-150600.5.23.1.i586"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.1-150600.5.23.1.i586",
"product": {
"name": "xwayland-devel-24.1.1-150600.5.23.1.i586",
"product_id": "xwayland-devel-24.1.1-150600.5.23.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.1-150600.5.23.1.ppc64le",
"product": {
"name": "xwayland-24.1.1-150600.5.23.1.ppc64le",
"product_id": "xwayland-24.1.1-150600.5.23.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.1-150600.5.23.1.ppc64le",
"product": {
"name": "xwayland-devel-24.1.1-150600.5.23.1.ppc64le",
"product_id": "xwayland-devel-24.1.1-150600.5.23.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.1-150600.5.23.1.s390x",
"product": {
"name": "xwayland-24.1.1-150600.5.23.1.s390x",
"product_id": "xwayland-24.1.1-150600.5.23.1.s390x"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.1-150600.5.23.1.s390x",
"product": {
"name": "xwayland-devel-24.1.1-150600.5.23.1.s390x",
"product_id": "xwayland-devel-24.1.1-150600.5.23.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.1-150600.5.23.1.x86_64",
"product": {
"name": "xwayland-24.1.1-150600.5.23.1.x86_64",
"product_id": "xwayland-24.1.1-150600.5.23.1.x86_64"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.1-150600.5.23.1.x86_64",
"product": {
"name": "xwayland-devel-24.1.1-150600.5.23.1.x86_64",
"product_id": "xwayland-devel-24.1.1-150600.5.23.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-24.1.1-150600.5.23.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.aarch64"
},
"product_reference": "xwayland-24.1.1-150600.5.23.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-24.1.1-150600.5.23.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.ppc64le"
},
"product_reference": "xwayland-24.1.1-150600.5.23.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-24.1.1-150600.5.23.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.s390x"
},
"product_reference": "xwayland-24.1.1-150600.5.23.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-24.1.1-150600.5.23.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.x86_64"
},
"product_reference": "xwayland-24.1.1-150600.5.23.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-24.1.1-150600.5.23.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.aarch64"
},
"product_reference": "xwayland-devel-24.1.1-150600.5.23.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-24.1.1-150600.5.23.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.ppc64le"
},
"product_reference": "xwayland-devel-24.1.1-150600.5.23.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-24.1.1-150600.5.23.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.s390x"
},
"product_reference": "xwayland-devel-24.1.1-150600.5.23.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-24.1.1-150600.5.23.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.x86_64"
},
"product_reference": "xwayland-devel-24.1.1-150600.5.23.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-33999",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-33999"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.x86_64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-33999",
"url": "https://www.suse.com/security/cve/CVE-2026-33999"
},
{
"category": "external",
"summary": "SUSE Bug 1260922 for CVE-2026-33999",
"url": "https://bugzilla.suse.com/1260922"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.x86_64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.x86_64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:06:20Z",
"details": "moderate"
}
],
"title": "CVE-2026-33999"
},
{
"cve": "CVE-2026-34000",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34000"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.x86_64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34000",
"url": "https://www.suse.com/security/cve/CVE-2026-34000"
},
{
"category": "external",
"summary": "SUSE Bug 1260923 for CVE-2026-34000",
"url": "https://bugzilla.suse.com/1260923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.x86_64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.x86_64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:06:20Z",
"details": "moderate"
}
],
"title": "CVE-2026-34000"
},
{
"cve": "CVE-2026-34001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34001"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.x86_64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34001",
"url": "https://www.suse.com/security/cve/CVE-2026-34001"
},
{
"category": "external",
"summary": "SUSE Bug 1260924 for CVE-2026-34001",
"url": "https://bugzilla.suse.com/1260924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.x86_64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.x86_64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:06:20Z",
"details": "important"
}
],
"title": "CVE-2026-34001"
},
{
"cve": "CVE-2026-34002",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34002"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.x86_64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34002",
"url": "https://www.suse.com/security/cve/CVE-2026-34002"
},
{
"category": "external",
"summary": "SUSE Bug 1260925 for CVE-2026-34002",
"url": "https://bugzilla.suse.com/1260925"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.x86_64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.x86_64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:06:20Z",
"details": "moderate"
}
],
"title": "CVE-2026-34002"
},
{
"cve": "CVE-2026-34003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34003"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.x86_64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34003",
"url": "https://www.suse.com/security/cve/CVE-2026-34003"
},
{
"category": "external",
"summary": "SUSE Bug 1260926 for CVE-2026-34003",
"url": "https://bugzilla.suse.com/1260926"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.x86_64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-24.1.1-150600.5.23.1.x86_64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.aarch64",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.ppc64le",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.s390x",
"openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.23.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:06:20Z",
"details": "moderate"
}
],
"title": "CVE-2026-34003"
}
]
}
SUSE-SU-2026:1332-1
Vulnerability from csaf_suse - Published: 2026-04-14 17:15 - Updated: 2026-04-14 17:15| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xorg-x11-server",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xorg-x11-server fixes the following issues:\n\n- CVE-2026-33999: XKB integer underflow in XkbSetCompatMap() (bsc#1260922).\n- CVE-2026-34000: XKB out-of-bounds read in CheckSetGeom() (bsc#1260923).\n- CVE-2026-34001: XSYNC use-after-free in miSyncTriggerFence() (bsc#1260924).\n- CVE-2026-34002: XKB out-of-bounds read in CheckModifierMap() (bsc#1260925).\n- CVE-2026-34003: XKB buffer overflow in CheckKeyTypes() (bsc#1260926).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1332,SUSE-SLE-SERVER-12-SP5-LTSS-2026-1332,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-1332",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1332-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1332-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261332-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1332-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-April/045533.html"
},
{
"category": "self",
"summary": "SUSE Bug 1260922",
"url": "https://bugzilla.suse.com/1260922"
},
{
"category": "self",
"summary": "SUSE Bug 1260923",
"url": "https://bugzilla.suse.com/1260923"
},
{
"category": "self",
"summary": "SUSE Bug 1260924",
"url": "https://bugzilla.suse.com/1260924"
},
{
"category": "self",
"summary": "SUSE Bug 1260925",
"url": "https://bugzilla.suse.com/1260925"
},
{
"category": "self",
"summary": "SUSE Bug 1260926",
"url": "https://bugzilla.suse.com/1260926"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-33999 page",
"url": "https://www.suse.com/security/cve/CVE-2026-33999/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34000 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34000/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34001 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34002 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34002/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34003 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34003/"
}
],
"title": "Security update for xorg-x11-server",
"tracking": {
"current_release_date": "2026-04-14T17:15:06Z",
"generator": {
"date": "2026-04-14T17:15:06Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1332-1",
"initial_release_date": "2026-04-14T17:15:06Z",
"revision_history": [
{
"date": "2026-04-14T17:15:06Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.19.6-10.99.1.aarch64",
"product": {
"name": "xorg-x11-server-1.19.6-10.99.1.aarch64",
"product_id": "xorg-x11-server-1.19.6-10.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.19.6-10.99.1.aarch64",
"product": {
"name": "xorg-x11-server-extra-1.19.6-10.99.1.aarch64",
"product_id": "xorg-x11-server-extra-1.19.6-10.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.19.6-10.99.1.aarch64",
"product": {
"name": "xorg-x11-server-sdk-1.19.6-10.99.1.aarch64",
"product_id": "xorg-x11-server-sdk-1.19.6-10.99.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.19.6-10.99.1.aarch64",
"product": {
"name": "xorg-x11-server-source-1.19.6-10.99.1.aarch64",
"product_id": "xorg-x11-server-source-1.19.6-10.99.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.19.6-10.99.1.i586",
"product": {
"name": "xorg-x11-server-1.19.6-10.99.1.i586",
"product_id": "xorg-x11-server-1.19.6-10.99.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.19.6-10.99.1.i586",
"product": {
"name": "xorg-x11-server-extra-1.19.6-10.99.1.i586",
"product_id": "xorg-x11-server-extra-1.19.6-10.99.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.19.6-10.99.1.i586",
"product": {
"name": "xorg-x11-server-sdk-1.19.6-10.99.1.i586",
"product_id": "xorg-x11-server-sdk-1.19.6-10.99.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.19.6-10.99.1.i586",
"product": {
"name": "xorg-x11-server-source-1.19.6-10.99.1.i586",
"product_id": "xorg-x11-server-source-1.19.6-10.99.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.19.6-10.99.1.ppc64le",
"product": {
"name": "xorg-x11-server-1.19.6-10.99.1.ppc64le",
"product_id": "xorg-x11-server-1.19.6-10.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.19.6-10.99.1.ppc64le",
"product": {
"name": "xorg-x11-server-extra-1.19.6-10.99.1.ppc64le",
"product_id": "xorg-x11-server-extra-1.19.6-10.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.19.6-10.99.1.ppc64le",
"product": {
"name": "xorg-x11-server-sdk-1.19.6-10.99.1.ppc64le",
"product_id": "xorg-x11-server-sdk-1.19.6-10.99.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.19.6-10.99.1.ppc64le",
"product": {
"name": "xorg-x11-server-source-1.19.6-10.99.1.ppc64le",
"product_id": "xorg-x11-server-source-1.19.6-10.99.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.19.6-10.99.1.s390",
"product": {
"name": "xorg-x11-server-1.19.6-10.99.1.s390",
"product_id": "xorg-x11-server-1.19.6-10.99.1.s390"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.19.6-10.99.1.s390",
"product": {
"name": "xorg-x11-server-extra-1.19.6-10.99.1.s390",
"product_id": "xorg-x11-server-extra-1.19.6-10.99.1.s390"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.19.6-10.99.1.s390",
"product": {
"name": "xorg-x11-server-sdk-1.19.6-10.99.1.s390",
"product_id": "xorg-x11-server-sdk-1.19.6-10.99.1.s390"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.19.6-10.99.1.s390",
"product": {
"name": "xorg-x11-server-source-1.19.6-10.99.1.s390",
"product_id": "xorg-x11-server-source-1.19.6-10.99.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.19.6-10.99.1.s390x",
"product": {
"name": "xorg-x11-server-1.19.6-10.99.1.s390x",
"product_id": "xorg-x11-server-1.19.6-10.99.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.19.6-10.99.1.s390x",
"product": {
"name": "xorg-x11-server-extra-1.19.6-10.99.1.s390x",
"product_id": "xorg-x11-server-extra-1.19.6-10.99.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.19.6-10.99.1.s390x",
"product": {
"name": "xorg-x11-server-sdk-1.19.6-10.99.1.s390x",
"product_id": "xorg-x11-server-sdk-1.19.6-10.99.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.19.6-10.99.1.s390x",
"product": {
"name": "xorg-x11-server-source-1.19.6-10.99.1.s390x",
"product_id": "xorg-x11-server-source-1.19.6-10.99.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.19.6-10.99.1.x86_64",
"product": {
"name": "xorg-x11-server-1.19.6-10.99.1.x86_64",
"product_id": "xorg-x11-server-1.19.6-10.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.19.6-10.99.1.x86_64",
"product": {
"name": "xorg-x11-server-extra-1.19.6-10.99.1.x86_64",
"product_id": "xorg-x11-server-extra-1.19.6-10.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.19.6-10.99.1.x86_64",
"product": {
"name": "xorg-x11-server-sdk-1.19.6-10.99.1.x86_64",
"product_id": "xorg-x11-server-sdk-1.19.6-10.99.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.19.6-10.99.1.x86_64",
"product": {
"name": "xorg-x11-server-source-1.19.6-10.99.1.x86_64",
"product_id": "xorg-x11-server-source-1.19.6-10.99.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.19.6-10.99.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.aarch64"
},
"product_reference": "xorg-x11-server-1.19.6-10.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.19.6-10.99.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.ppc64le"
},
"product_reference": "xorg-x11-server-1.19.6-10.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.19.6-10.99.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.s390x"
},
"product_reference": "xorg-x11-server-1.19.6-10.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.19.6-10.99.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.x86_64"
},
"product_reference": "xorg-x11-server-1.19.6-10.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.19.6-10.99.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-1.19.6-10.99.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.19.6-10.99.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-1.19.6-10.99.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.19.6-10.99.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.s390x"
},
"product_reference": "xorg-x11-server-extra-1.19.6-10.99.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.19.6-10.99.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.19.6-10.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.19.6-10.99.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-1.19.6-10.99.1.x86_64"
},
"product_reference": "xorg-x11-server-1.19.6-10.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.19.6-10.99.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-extra-1.19.6-10.99.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.19.6-10.99.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-33999",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-33999"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-extra-1.19.6-10.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-33999",
"url": "https://www.suse.com/security/cve/CVE-2026-33999"
},
{
"category": "external",
"summary": "SUSE Bug 1260922 for CVE-2026-33999",
"url": "https://bugzilla.suse.com/1260922"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-extra-1.19.6-10.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-extra-1.19.6-10.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:15:06Z",
"details": "moderate"
}
],
"title": "CVE-2026-33999"
},
{
"cve": "CVE-2026-34000",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34000"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-extra-1.19.6-10.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34000",
"url": "https://www.suse.com/security/cve/CVE-2026-34000"
},
{
"category": "external",
"summary": "SUSE Bug 1260923 for CVE-2026-34000",
"url": "https://bugzilla.suse.com/1260923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-extra-1.19.6-10.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-extra-1.19.6-10.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:15:06Z",
"details": "moderate"
}
],
"title": "CVE-2026-34000"
},
{
"cve": "CVE-2026-34001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34001"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-extra-1.19.6-10.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34001",
"url": "https://www.suse.com/security/cve/CVE-2026-34001"
},
{
"category": "external",
"summary": "SUSE Bug 1260924 for CVE-2026-34001",
"url": "https://bugzilla.suse.com/1260924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-extra-1.19.6-10.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-extra-1.19.6-10.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:15:06Z",
"details": "important"
}
],
"title": "CVE-2026-34001"
},
{
"cve": "CVE-2026-34002",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34002"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-extra-1.19.6-10.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34002",
"url": "https://www.suse.com/security/cve/CVE-2026-34002"
},
{
"category": "external",
"summary": "SUSE Bug 1260925 for CVE-2026-34002",
"url": "https://bugzilla.suse.com/1260925"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-extra-1.19.6-10.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-extra-1.19.6-10.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:15:06Z",
"details": "moderate"
}
],
"title": "CVE-2026-34002"
},
{
"cve": "CVE-2026-34003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34003"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-extra-1.19.6-10.99.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34003",
"url": "https://www.suse.com/security/cve/CVE-2026-34003"
},
{
"category": "external",
"summary": "SUSE Bug 1260926 for CVE-2026-34003",
"url": "https://bugzilla.suse.com/1260926"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-extra-1.19.6-10.99.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:xorg-x11-server-extra-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-1.19.6-10.99.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:xorg-x11-server-extra-1.19.6-10.99.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:15:06Z",
"details": "moderate"
}
],
"title": "CVE-2026-34003"
}
]
}
SUSE-SU-2026:1328-1
Vulnerability from csaf_suse - Published: 2026-04-14 17:04 - Updated: 2026-04-14 17:04| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xwayland",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xwayland fixes the following issues:\n\n- CVE-2026-33999: XKB integer underflow in XkbSetCompatMap() (bsc#1260922).\n- CVE-2026-34000: XKB out-of-bounds read in CheckSetGeom() (bsc#1260923).\n- CVE-2026-34001: XSYNC use-after-free in miSyncTriggerFence() (bsc#1260924).\n- CVE-2026-34002: XKB out-of-bounds read in CheckModifierMap() (bsc#1260925).\n- CVE-2026-34003: XKB buffer overflow in CheckKeyTypes() (bsc#1260926).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1328,SUSE-SLE-Product-WE-15-SP7-2026-1328",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1328-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1328-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261328-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1328-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-April/045537.html"
},
{
"category": "self",
"summary": "SUSE Bug 1260922",
"url": "https://bugzilla.suse.com/1260922"
},
{
"category": "self",
"summary": "SUSE Bug 1260923",
"url": "https://bugzilla.suse.com/1260923"
},
{
"category": "self",
"summary": "SUSE Bug 1260924",
"url": "https://bugzilla.suse.com/1260924"
},
{
"category": "self",
"summary": "SUSE Bug 1260925",
"url": "https://bugzilla.suse.com/1260925"
},
{
"category": "self",
"summary": "SUSE Bug 1260926",
"url": "https://bugzilla.suse.com/1260926"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-33999 page",
"url": "https://www.suse.com/security/cve/CVE-2026-33999/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34000 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34000/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34001 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34002 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34002/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34003 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34003/"
}
],
"title": "Security update for xwayland",
"tracking": {
"current_release_date": "2026-04-14T17:04:46Z",
"generator": {
"date": "2026-04-14T17:04:46Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1328-1",
"initial_release_date": "2026-04-14T17:04:46Z",
"revision_history": [
{
"date": "2026-04-14T17:04:46Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.5-150700.3.14.1.aarch64",
"product": {
"name": "xwayland-24.1.5-150700.3.14.1.aarch64",
"product_id": "xwayland-24.1.5-150700.3.14.1.aarch64"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.5-150700.3.14.1.aarch64",
"product": {
"name": "xwayland-devel-24.1.5-150700.3.14.1.aarch64",
"product_id": "xwayland-devel-24.1.5-150700.3.14.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.5-150700.3.14.1.i586",
"product": {
"name": "xwayland-24.1.5-150700.3.14.1.i586",
"product_id": "xwayland-24.1.5-150700.3.14.1.i586"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.5-150700.3.14.1.i586",
"product": {
"name": "xwayland-devel-24.1.5-150700.3.14.1.i586",
"product_id": "xwayland-devel-24.1.5-150700.3.14.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.5-150700.3.14.1.ppc64le",
"product": {
"name": "xwayland-24.1.5-150700.3.14.1.ppc64le",
"product_id": "xwayland-24.1.5-150700.3.14.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.5-150700.3.14.1.ppc64le",
"product": {
"name": "xwayland-devel-24.1.5-150700.3.14.1.ppc64le",
"product_id": "xwayland-devel-24.1.5-150700.3.14.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.5-150700.3.14.1.s390x",
"product": {
"name": "xwayland-24.1.5-150700.3.14.1.s390x",
"product_id": "xwayland-24.1.5-150700.3.14.1.s390x"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.5-150700.3.14.1.s390x",
"product": {
"name": "xwayland-devel-24.1.5-150700.3.14.1.s390x",
"product_id": "xwayland-devel-24.1.5-150700.3.14.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-24.1.5-150700.3.14.1.x86_64",
"product": {
"name": "xwayland-24.1.5-150700.3.14.1.x86_64",
"product_id": "xwayland-24.1.5-150700.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "xwayland-devel-24.1.5-150700.3.14.1.x86_64",
"product": {
"name": "xwayland-devel-24.1.5-150700.3.14.1.x86_64",
"product_id": "xwayland-devel-24.1.5-150700.3.14.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-24.1.5-150700.3.14.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP7",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP7:xwayland-24.1.5-150700.3.14.1.x86_64"
},
"product_reference": "xwayland-24.1.5-150700.3.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-33999",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-33999"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Workstation Extension 15 SP7:xwayland-24.1.5-150700.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-33999",
"url": "https://www.suse.com/security/cve/CVE-2026-33999"
},
{
"category": "external",
"summary": "SUSE Bug 1260922 for CVE-2026-33999",
"url": "https://bugzilla.suse.com/1260922"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Workstation Extension 15 SP7:xwayland-24.1.5-150700.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Workstation Extension 15 SP7:xwayland-24.1.5-150700.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:04:46Z",
"details": "moderate"
}
],
"title": "CVE-2026-33999"
},
{
"cve": "CVE-2026-34000",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34000"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Workstation Extension 15 SP7:xwayland-24.1.5-150700.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34000",
"url": "https://www.suse.com/security/cve/CVE-2026-34000"
},
{
"category": "external",
"summary": "SUSE Bug 1260923 for CVE-2026-34000",
"url": "https://bugzilla.suse.com/1260923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Workstation Extension 15 SP7:xwayland-24.1.5-150700.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Workstation Extension 15 SP7:xwayland-24.1.5-150700.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:04:46Z",
"details": "moderate"
}
],
"title": "CVE-2026-34000"
},
{
"cve": "CVE-2026-34001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34001"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Workstation Extension 15 SP7:xwayland-24.1.5-150700.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34001",
"url": "https://www.suse.com/security/cve/CVE-2026-34001"
},
{
"category": "external",
"summary": "SUSE Bug 1260924 for CVE-2026-34001",
"url": "https://bugzilla.suse.com/1260924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Workstation Extension 15 SP7:xwayland-24.1.5-150700.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Workstation Extension 15 SP7:xwayland-24.1.5-150700.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:04:46Z",
"details": "important"
}
],
"title": "CVE-2026-34001"
},
{
"cve": "CVE-2026-34002",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34002"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Workstation Extension 15 SP7:xwayland-24.1.5-150700.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34002",
"url": "https://www.suse.com/security/cve/CVE-2026-34002"
},
{
"category": "external",
"summary": "SUSE Bug 1260925 for CVE-2026-34002",
"url": "https://bugzilla.suse.com/1260925"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Workstation Extension 15 SP7:xwayland-24.1.5-150700.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Workstation Extension 15 SP7:xwayland-24.1.5-150700.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:04:46Z",
"details": "moderate"
}
],
"title": "CVE-2026-34002"
},
{
"cve": "CVE-2026-34003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34003"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Workstation Extension 15 SP7:xwayland-24.1.5-150700.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34003",
"url": "https://www.suse.com/security/cve/CVE-2026-34003"
},
{
"category": "external",
"summary": "SUSE Bug 1260926 for CVE-2026-34003",
"url": "https://bugzilla.suse.com/1260926"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Workstation Extension 15 SP7:xwayland-24.1.5-150700.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Workstation Extension 15 SP7:xwayland-24.1.5-150700.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:04:46Z",
"details": "moderate"
}
],
"title": "CVE-2026-34003"
}
]
}
SUSE-SU-2026:1335-1
Vulnerability from csaf_suse - Published: 2026-04-14 17:28 - Updated: 2026-04-14 17:28| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xorg-x11-server",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xorg-x11-server fixes the following issues:\n\n- CVE-2026-33999: XKB Integer Underflow in XkbSetCompatMap() (bsc#1260922).\n- CVE-2026-34000: XKB Out-of-bounds Read in CheckSetGeom() (bsc#1260923).\n- CVE-2026-34001: XSYNC Use-after-free in miSyncTriggerFence() (bsc#1260924).\n- CVE-2026-34002: XKB Out-of-bounds read in CheckModifierMap() (bsc#1260925).\n- CVE-2026-34003: XKB Buffer overflow in CheckKeyTypes() (bsc#1260926).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1335,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1335,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1335,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1335,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1335",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1335-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1335-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261335-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1335-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-April/045531.html"
},
{
"category": "self",
"summary": "SUSE Bug 1260922",
"url": "https://bugzilla.suse.com/1260922"
},
{
"category": "self",
"summary": "SUSE Bug 1260923",
"url": "https://bugzilla.suse.com/1260923"
},
{
"category": "self",
"summary": "SUSE Bug 1260924",
"url": "https://bugzilla.suse.com/1260924"
},
{
"category": "self",
"summary": "SUSE Bug 1260925",
"url": "https://bugzilla.suse.com/1260925"
},
{
"category": "self",
"summary": "SUSE Bug 1260926",
"url": "https://bugzilla.suse.com/1260926"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-33999 page",
"url": "https://www.suse.com/security/cve/CVE-2026-33999/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34000 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34000/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34001 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34002 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34002/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34003 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34003/"
}
],
"title": "Security update for xorg-x11-server",
"tracking": {
"current_release_date": "2026-04-14T17:28:43Z",
"generator": {
"date": "2026-04-14T17:28:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1335-1",
"initial_release_date": "2026-04-14T17:28:43Z",
"revision_history": [
{
"date": "2026-04-14T17:28:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"product": {
"name": "xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"product_id": "xorg-x11-server-21.1.4-150500.7.46.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"product_id": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"product": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"product_id": "xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"product": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"product_id": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.4-150500.7.46.1.aarch64",
"product": {
"name": "xorg-x11-server-source-21.1.4-150500.7.46.1.aarch64",
"product_id": "xorg-x11-server-source-21.1.4-150500.7.46.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.4-150500.7.46.1.i586",
"product": {
"name": "xorg-x11-server-21.1.4-150500.7.46.1.i586",
"product_id": "xorg-x11-server-21.1.4-150500.7.46.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.i586",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.i586",
"product_id": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.4-150500.7.46.1.i586",
"product": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.46.1.i586",
"product_id": "xorg-x11-server-extra-21.1.4-150500.7.46.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.i586",
"product": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.i586",
"product_id": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.4-150500.7.46.1.i586",
"product": {
"name": "xorg-x11-server-source-21.1.4-150500.7.46.1.i586",
"product_id": "xorg-x11-server-source-21.1.4-150500.7.46.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"product": {
"name": "xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"product_id": "xorg-x11-server-21.1.4-150500.7.46.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"product_id": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"product": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"product_id": "xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"product": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"product_id": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.4-150500.7.46.1.ppc64le",
"product": {
"name": "xorg-x11-server-source-21.1.4-150500.7.46.1.ppc64le",
"product_id": "xorg-x11-server-source-21.1.4-150500.7.46.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.4-150500.7.46.1.s390x",
"product": {
"name": "xorg-x11-server-21.1.4-150500.7.46.1.s390x",
"product_id": "xorg-x11-server-21.1.4-150500.7.46.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.s390x",
"product_id": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.4-150500.7.46.1.s390x",
"product": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.46.1.s390x",
"product_id": "xorg-x11-server-extra-21.1.4-150500.7.46.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.s390x",
"product": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.s390x",
"product_id": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.4-150500.7.46.1.s390x",
"product": {
"name": "xorg-x11-server-source-21.1.4-150500.7.46.1.s390x",
"product_id": "xorg-x11-server-source-21.1.4-150500.7.46.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"product": {
"name": "xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"product_id": "xorg-x11-server-21.1.4-150500.7.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"product_id": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"product": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"product_id": "xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"product": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"product_id": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.4-150500.7.46.1.x86_64",
"product": {
"name": "xorg-x11-server-source-21.1.4-150500.7.46.1.x86_64",
"product_id": "xorg-x11-server-source-21.1.4-150500.7.46.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.46.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.46.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.46.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.46.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.46.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.46.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.46.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.s390x"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.46.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.46.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.46.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.s390x"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.46.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.s390x"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.46.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.x86_64"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-33999",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-33999"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-33999",
"url": "https://www.suse.com/security/cve/CVE-2026-33999"
},
{
"category": "external",
"summary": "SUSE Bug 1260922 for CVE-2026-33999",
"url": "https://bugzilla.suse.com/1260922"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:28:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-33999"
},
{
"cve": "CVE-2026-34000",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34000"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34000",
"url": "https://www.suse.com/security/cve/CVE-2026-34000"
},
{
"category": "external",
"summary": "SUSE Bug 1260923 for CVE-2026-34000",
"url": "https://bugzilla.suse.com/1260923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:28:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-34000"
},
{
"cve": "CVE-2026-34001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34001"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34001",
"url": "https://www.suse.com/security/cve/CVE-2026-34001"
},
{
"category": "external",
"summary": "SUSE Bug 1260924 for CVE-2026-34001",
"url": "https://bugzilla.suse.com/1260924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:28:43Z",
"details": "important"
}
],
"title": "CVE-2026-34001"
},
{
"cve": "CVE-2026-34002",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34002"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34002",
"url": "https://www.suse.com/security/cve/CVE-2026-34002"
},
{
"category": "external",
"summary": "SUSE Bug 1260925 for CVE-2026-34002",
"url": "https://bugzilla.suse.com/1260925"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:28:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-34002"
},
{
"cve": "CVE-2026-34003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34003"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34003",
"url": "https://www.suse.com/security/cve/CVE-2026-34003"
},
{
"category": "external",
"summary": "SUSE Bug 1260926 for CVE-2026-34003",
"url": "https://bugzilla.suse.com/1260926"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.46.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T17:28:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-34003"
}
]
}
RHSA-2026:11352
Vulnerability from csaf_redhat - Published: 2026-04-28 11:29 - Updated: 2026-04-29 18:27A flaw was found in the X.Org X server. This integer underflow vulnerability, specifically in the XKB compatibility map handling, allows an attacker with local or remote X11 server access to trigger a buffer read overrun. This can lead to memory-safety violations and potentially a denial of service (DoS) or other severe impacts.
A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit this without user interaction, leading to a server crash and potentially enabling memory corruption. This could result in a denial of service or further compromise of the system.
A flaw was found in the X.Org X server's XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Xwayland is an X server for running X clients under Wayland.\n\nSecurity Fix(es):\n\n* xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999)\n\n* xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001)\n\n* xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:11352",
"url": "https://access.redhat.com/errata/RHSA-2026:11352"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2451106",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451106"
},
{
"category": "external",
"summary": "2451109",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451109"
},
{
"category": "external",
"summary": "2451113",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451113"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_11352.json"
}
],
"title": "Red Hat Security Advisory: xorg-x11-server-Xwayland security update",
"tracking": {
"current_release_date": "2026-04-29T18:27:42+00:00",
"generator": {
"date": "2026-04-29T18:27:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:11352",
"initial_release_date": "2026-04-28T11:29:51+00:00",
"revision_history": [
{
"date": "2026-04-28T11:29:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-28T11:29:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T18:27:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"product": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"product_id": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@24.1.5-6.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"product_id": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@24.1.5-6.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@24.1.5-6.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@24.1.5-6.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"product_id": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@24.1.5-6.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"product_id": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@24.1.5-6.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@24.1.5-6.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@24.1.5-6.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"product_id": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@24.1.5-6.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"product_id": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@24.1.5-6.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@24.1.5-6.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@24.1.5-6.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64",
"product_id": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@24.1.5-6.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"product_id": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@24.1.5-6.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@24.1.5-6.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@24.1.5-6.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"product_id": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@24.1.5-6.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "TrendAI Zero Day Initiative"
}
],
"cve": "CVE-2026-33999",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"discovery_date": "2026-03-25T06:29:19.544586+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451106"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server. This integer underflow vulnerability, specifically in the XKB compatibility map handling, allows an attacker with local or remote X11 server access to trigger a buffer read overrun. This can lead to memory-safety violations and potentially a denial of service (DoS) or other severe impacts.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "An Important integer underflow vulnerability exists in the X.Org X server\u0027s XKB compatibility map handling. This flaw allows an attacker with local or remote X11 server access to trigger a buffer read overrun, leading to memory-safety violations and potential denial of service. Red Hat Enterprise Linux systems utilizing the X.Org X server in graphical environments are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33999"
},
{
"category": "external",
"summary": "RHBZ#2451106",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451106"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33999"
}
],
"release_date": "2026-04-23T14:11:12.550000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-28T11:29:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11352"
},
{
"category": "workaround",
"details": "To mitigate this issue, restrict access to the X11 server. For remote access, disable X11 forwarding in SSH configurations if not required. Edit `/etc/ssh/sshd_config` and set `X11Forwarding no`. After modifying the configuration, restart the `sshd` service using `systemctl restart sshd`. Disabling X11 forwarding may impact remote graphical applications.",
"product_ids": [
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "TrendAI Zero Day Initiative"
}
],
"cve": "CVE-2026-34001",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2026-03-25T07:00:05.329048+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451109"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit this without user interaction, leading to a server crash and potentially enabling memory corruption. This could result in a denial of service or further compromise of the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Important: This use-after-free vulnerability in the X.Org X server\u0027s XSYNC fence triggering logic can lead to a server crash and potential memory corruption. Exploitation requires an attacker to have access to the X11 server, typically limited to local users or trusted remote connections. Systems not running the X.Org X server are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-34001"
},
{
"category": "external",
"summary": "RHBZ#2451109",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451109"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-34001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-34001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34001"
}
],
"release_date": "2026-04-23T14:14:42.224000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-28T11:29:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11352"
},
{
"category": "workaround",
"details": "To mitigate this issue, restrict access to the X11 server to trusted users and networks. If the X.Org X server is not required, consider disabling or uninstalling it. For environments where the X server is essential, running X applications within a sandboxed environment can help reduce the attack surface.",
"product_ids": [
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "TrendAI Zero Day Initiative"
}
],
"cve": "CVE-2026-34003",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2026-03-25T07:19:13.949261+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451113"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server\u0027s XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "An Important out-of-bounds memory access vulnerability exists in the X.Org X server\u0027s XKB key types request validation. This flaw could lead to information exposure or a server crash and requires a specially crafted request to trigger. Systems running a graphical environment are potentially affected, with higher impact outcomes possible in certain configurations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-34003"
},
{
"category": "external",
"summary": "RHBZ#2451113",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451113"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-34003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34003"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-34003",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34003"
}
],
"release_date": "2026-04-23T14:18:00.653000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-28T11:29:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11352"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"AppStream-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.src",
"CRB-10.1.Z:xorg-x11-server-Xwayland-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debuginfo-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-debugsource-0:24.1.5-6.el10_1.x86_64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.aarch64",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.ppc64le",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.s390x",
"CRB-10.1.Z:xorg-x11-server-Xwayland-devel-0:24.1.5-6.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access"
}
]
}
RHSA-2026:11369
Vulnerability from csaf_redhat - Published: 2026-04-28 15:01 - Updated: 2026-04-29 18:27A flaw was found in the X.Org X server. This integer underflow vulnerability, specifically in the XKB compatibility map handling, allows an attacker with local or remote X11 server access to trigger a buffer read overrun. This can lead to memory-safety violations and potentially a denial of service (DoS) or other severe impacts.
A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit this without user interaction, leading to a server crash and potentially enabling memory corruption. This could result in a denial of service or further compromise of the system.
A flaw was found in the X.Org X server's XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Xwayland is an X server for running X clients under Wayland.\n\nSecurity Fix(es):\n\n* xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999)\n\n* xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001)\n\n* xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:11369",
"url": "https://access.redhat.com/errata/RHSA-2026:11369"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2451106",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451106"
},
{
"category": "external",
"summary": "2451109",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451109"
},
{
"category": "external",
"summary": "2451113",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451113"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_11369.json"
}
],
"title": "Red Hat Security Advisory: xorg-x11-server-Xwayland security update",
"tracking": {
"current_release_date": "2026-04-29T18:27:42+00:00",
"generator": {
"date": "2026-04-29T18:27:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:11369",
"initial_release_date": "2026-04-28T15:01:21+00:00",
"revision_history": [
{
"date": "2026-04-28T15:01:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-28T15:01:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T18:27:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"product": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"product_id": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-6.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"product_id": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-6.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-6.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-6.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-6.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-6.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-6.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-6.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-6.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"product_id": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-6.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-6.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-6.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64",
"product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-6.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"product_id": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-6.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-6.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-6.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-6.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"product": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"product_id": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-6.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"product": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-6.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-6.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-6.el9_7?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "TrendAI Zero Day Initiative"
}
],
"cve": "CVE-2026-33999",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"discovery_date": "2026-03-25T06:29:19.544586+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451106"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server. This integer underflow vulnerability, specifically in the XKB compatibility map handling, allows an attacker with local or remote X11 server access to trigger a buffer read overrun. This can lead to memory-safety violations and potentially a denial of service (DoS) or other severe impacts.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "An Important integer underflow vulnerability exists in the X.Org X server\u0027s XKB compatibility map handling. This flaw allows an attacker with local or remote X11 server access to trigger a buffer read overrun, leading to memory-safety violations and potential denial of service. Red Hat Enterprise Linux systems utilizing the X.Org X server in graphical environments are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33999"
},
{
"category": "external",
"summary": "RHBZ#2451106",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451106"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33999"
}
],
"release_date": "2026-04-23T14:11:12.550000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-28T15:01:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11369"
},
{
"category": "workaround",
"details": "To mitigate this issue, restrict access to the X11 server. For remote access, disable X11 forwarding in SSH configurations if not required. Edit `/etc/ssh/sshd_config` and set `X11Forwarding no`. After modifying the configuration, restart the `sshd` service using `systemctl restart sshd`. Disabling X11 forwarding may impact remote graphical applications.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "TrendAI Zero Day Initiative"
}
],
"cve": "CVE-2026-34001",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2026-03-25T07:00:05.329048+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451109"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit this without user interaction, leading to a server crash and potentially enabling memory corruption. This could result in a denial of service or further compromise of the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Important: This use-after-free vulnerability in the X.Org X server\u0027s XSYNC fence triggering logic can lead to a server crash and potential memory corruption. Exploitation requires an attacker to have access to the X11 server, typically limited to local users or trusted remote connections. Systems not running the X.Org X server are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-34001"
},
{
"category": "external",
"summary": "RHBZ#2451109",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451109"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-34001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-34001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34001"
}
],
"release_date": "2026-04-23T14:14:42.224000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-28T15:01:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11369"
},
{
"category": "workaround",
"details": "To mitigate this issue, restrict access to the X11 server to trusted users and networks. If the X.Org X server is not required, consider disabling or uninstalling it. For environments where the X server is essential, running X applications within a sandboxed environment can help reduce the attack surface.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "TrendAI Zero Day Initiative"
}
],
"cve": "CVE-2026-34003",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2026-03-25T07:19:13.949261+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451113"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server\u0027s XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "An Important out-of-bounds memory access vulnerability exists in the X.Org X server\u0027s XKB key types request validation. This flaw could lead to information exposure or a server crash and requires a specially crafted request to trigger. Systems running a graphical environment are potentially affected, with higher impact outcomes possible in certain configurations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-34003"
},
{
"category": "external",
"summary": "RHBZ#2451113",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451113"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-34003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34003"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-34003",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34003"
}
],
"release_date": "2026-04-23T14:18:00.653000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-28T15:01:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11369"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-debugsource-0:23.2.7-6.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xwayland-devel-0:23.2.7-6.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access"
}
]
}
RHSA-2026:11388
Vulnerability from csaf_redhat - Published: 2026-04-28 18:07 - Updated: 2026-04-29 18:27A flaw was found in the X.Org X server. This integer underflow vulnerability, specifically in the XKB compatibility map handling, allows an attacker with local or remote X11 server access to trigger a buffer read overrun. This can lead to memory-safety violations and potentially a denial of service (DoS) or other severe impacts.
A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit this without user interaction, leading to a server crash and potentially enabling memory corruption. This could result in a denial of service or further compromise of the system.
A flaw was found in the X.Org X server's XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for xorg-x11-server is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.\n\nSecurity Fix(es):\n\n* xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999)\n\n* xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001)\n\n* xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:11388",
"url": "https://access.redhat.com/errata/RHSA-2026:11388"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2451106",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451106"
},
{
"category": "external",
"summary": "2451109",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451109"
},
{
"category": "external",
"summary": "2451113",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451113"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_11388.json"
}
],
"title": "Red Hat Security Advisory: xorg-x11-server security update",
"tracking": {
"current_release_date": "2026-04-29T18:27:43+00:00",
"generator": {
"date": "2026-04-29T18:27:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:11388",
"initial_release_date": "2026-04-28T18:07:07+00:00",
"revision_history": [
{
"date": "2026-04-28T18:07:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-28T18:07:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T18:27:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-0:1.20.11-33.el9_7.src",
"product": {
"name": "xorg-x11-server-0:1.20.11-33.el9_7.src",
"product_id": "xorg-x11-server-0:1.20.11-33.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server@1.20.11-33.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-33.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-33.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-33.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-33.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-33.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"product_id": "xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-33.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-33.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-33.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-33.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-33.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-33.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-33.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-33.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"product_id": "xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-33.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-33.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-33.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-33.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-33.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-33.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"product_id": "xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-33.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-33.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-33.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-33.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-33.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-33.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-33.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-33.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"product_id": "xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-33.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-33.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-33.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-33.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-33.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-33.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"product_id": "xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-33.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-33.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-33.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-33.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-33.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-33.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-33.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-33.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"product_id": "xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-33.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-33.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-33.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-33.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-33.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-33.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"product_id": "xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-33.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-33.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-33.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-33.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-33.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-33.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-33.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-33.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"product_id": "xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-33.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"product_id": "xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-33.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-33.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-33.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-33.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-33.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-33.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-33.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-33.el9_7?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-source-0:1.20.11-33.el9_7.noarch",
"product": {
"name": "xorg-x11-server-source-0:1.20.11-33.el9_7.noarch",
"product_id": "xorg-x11-server-source-0:1.20.11-33.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-source@1.20.11-33.el9_7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.11-33.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-33.el9_7.src"
},
"product_reference": "xorg-x11-server-0:1.20.11-33.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-33.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.11-33.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-33.el9_7.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.11-33.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.11-33.el9_7.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-33.el9_7.src"
},
"product_reference": "xorg-x11-server-0:1.20.11-33.el9_7.src",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-33.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.11-33.el9_7.noarch as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-33.el9_7.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.11-33.el9_7.noarch",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "TrendAI Zero Day Initiative"
}
],
"cve": "CVE-2026-33999",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"discovery_date": "2026-03-25T06:29:19.544586+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451106"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server. This integer underflow vulnerability, specifically in the XKB compatibility map handling, allows an attacker with local or remote X11 server access to trigger a buffer read overrun. This can lead to memory-safety violations and potentially a denial of service (DoS) or other severe impacts.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "An Important integer underflow vulnerability exists in the X.Org X server\u0027s XKB compatibility map handling. This flaw allows an attacker with local or remote X11 server access to trigger a buffer read overrun, leading to memory-safety violations and potential denial of service. Red Hat Enterprise Linux systems utilizing the X.Org X server in graphical environments are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-33.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-33.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-33.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-33.el9_7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33999"
},
{
"category": "external",
"summary": "RHBZ#2451106",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451106"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33999"
}
],
"release_date": "2026-04-23T14:11:12.550000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-28T18:07:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-33.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-33.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-33.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-33.el9_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11388"
},
{
"category": "workaround",
"details": "To mitigate this issue, restrict access to the X11 server. For remote access, disable X11 forwarding in SSH configurations if not required. Edit `/etc/ssh/sshd_config` and set `X11Forwarding no`. After modifying the configuration, restart the `sshd` service using `systemctl restart sshd`. Disabling X11 forwarding may impact remote graphical applications.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-33.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-33.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-33.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-33.el9_7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-33.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-33.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-33.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-33.el9_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "TrendAI Zero Day Initiative"
}
],
"cve": "CVE-2026-34001",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2026-03-25T07:00:05.329048+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451109"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit this without user interaction, leading to a server crash and potentially enabling memory corruption. This could result in a denial of service or further compromise of the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Important: This use-after-free vulnerability in the X.Org X server\u0027s XSYNC fence triggering logic can lead to a server crash and potential memory corruption. Exploitation requires an attacker to have access to the X11 server, typically limited to local users or trusted remote connections. Systems not running the X.Org X server are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-33.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-33.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-33.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-33.el9_7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-34001"
},
{
"category": "external",
"summary": "RHBZ#2451109",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451109"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-34001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-34001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34001"
}
],
"release_date": "2026-04-23T14:14:42.224000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-28T18:07:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-33.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-33.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-33.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-33.el9_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11388"
},
{
"category": "workaround",
"details": "To mitigate this issue, restrict access to the X11 server to trusted users and networks. If the X.Org X server is not required, consider disabling or uninstalling it. For environments where the X server is essential, running X applications within a sandboxed environment can help reduce the attack surface.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-33.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-33.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-33.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-33.el9_7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-33.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-33.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-33.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-33.el9_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "TrendAI Zero Day Initiative"
}
],
"cve": "CVE-2026-34003",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2026-03-25T07:19:13.949261+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451113"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server\u0027s XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "An Important out-of-bounds memory access vulnerability exists in the X.Org X server\u0027s XKB key types request validation. This flaw could lead to information exposure or a server crash and requires a specially crafted request to trigger. Systems running a graphical environment are potentially affected, with higher impact outcomes possible in certain configurations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-33.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-33.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-33.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-33.el9_7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-34003"
},
{
"category": "external",
"summary": "RHBZ#2451113",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451113"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-34003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34003"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-34003",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34003"
}
],
"release_date": "2026-04-23T14:18:00.653000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-28T18:07:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-33.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-33.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-33.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-33.el9_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11388"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-33.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-33.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-33.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-33.el9_7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-33.el9_7.src",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-33.el9_7.noarch",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-0:1.20.11-33.el9_7.src",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xnest-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xorg-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-common-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debuginfo-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-debugsource-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.i686",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-devel-0:1.20.11-33.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:xorg-x11-server-source-0:1.20.11-33.el9_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access"
}
]
}
RHSA-2026:10739
Vulnerability from csaf_redhat - Published: 2026-04-27 08:36 - Updated: 2026-04-29 18:27A flaw was found in the X.Org X server. This integer underflow vulnerability, specifically in the XKB compatibility map handling, allows an attacker with local or remote X11 server access to trigger a buffer read overrun. This can lead to memory-safety violations and potentially a denial of service (DoS) or other severe impacts.
A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit this without user interaction, leading to a server crash and potentially enabling memory corruption. This could result in a denial of service or further compromise of the system.
A flaw was found in the X.Org X server's XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible.
A flaw was found in TigerVNC's x0vncserver component. Due to incorrect permissions in the Image.cxx file, other users on the system can observe or manipulate the screen contents of a running session. This vulnerability could also lead to an application crash, resulting in a Denial of Service (DoS).
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999)\n\n* xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001)\n\n* xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003)\n\n* TigerVNC: x0vncserver: TigerVNC x0vncserver: Information disclosure, data manipulation, and denial of service via incorrect permissions (CVE-2026-34352)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:10739",
"url": "https://access.redhat.com/errata/RHSA-2026:10739"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2451106",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451106"
},
{
"category": "external",
"summary": "2451109",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451109"
},
{
"category": "external",
"summary": "2451113",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451113"
},
{
"category": "external",
"summary": "2452022",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2452022"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_10739.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2026-04-29T18:27:42+00:00",
"generator": {
"date": "2026-04-29T18:27:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:10739",
"initial_release_date": "2026-04-27T08:36:07+00:00",
"revision_history": [
{
"date": "2026-04-27T08:36:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-27T08:36:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T18:27:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.15.0-6.el9_7.1.src",
"product": {
"name": "tigervnc-0:1.15.0-6.el9_7.1.src",
"product_id": "tigervnc-0:1.15.0-6.el9_7.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.15.0-6.el9_7.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.15.0-6.el9_7.1.aarch64",
"product": {
"name": "tigervnc-0:1.15.0-6.el9_7.1.aarch64",
"product_id": "tigervnc-0:1.15.0-6.el9_7.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.15.0-6.el9_7.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.15.0-6.el9_7.1.aarch64",
"product": {
"name": "tigervnc-server-0:1.15.0-6.el9_7.1.aarch64",
"product_id": "tigervnc-server-0:1.15.0-6.el9_7.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.15.0-6.el9_7.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.15.0-6.el9_7.1.aarch64",
"product": {
"name": "tigervnc-server-minimal-0:1.15.0-6.el9_7.1.aarch64",
"product_id": "tigervnc-server-minimal-0:1.15.0-6.el9_7.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.15.0-6.el9_7.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.15.0-6.el9_7.1.aarch64",
"product": {
"name": "tigervnc-server-module-0:1.15.0-6.el9_7.1.aarch64",
"product_id": "tigervnc-server-module-0:1.15.0-6.el9_7.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.15.0-6.el9_7.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.15.0-6.el9_7.1.aarch64",
"product": {
"name": "tigervnc-debugsource-0:1.15.0-6.el9_7.1.aarch64",
"product_id": "tigervnc-debugsource-0:1.15.0-6.el9_7.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.15.0-6.el9_7.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"product": {
"name": "tigervnc-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"product_id": "tigervnc-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.15.0-6.el9_7.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"product_id": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.15.0-6.el9_7.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.15.0-6.el9_7.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"product_id": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.15.0-6.el9_7.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.15.0-6.el9_7.1.ppc64le",
"product": {
"name": "tigervnc-0:1.15.0-6.el9_7.1.ppc64le",
"product_id": "tigervnc-0:1.15.0-6.el9_7.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.15.0-6.el9_7.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.15.0-6.el9_7.1.ppc64le",
"product": {
"name": "tigervnc-server-0:1.15.0-6.el9_7.1.ppc64le",
"product_id": "tigervnc-server-0:1.15.0-6.el9_7.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.15.0-6.el9_7.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.15.0-6.el9_7.1.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.15.0-6.el9_7.1.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.15.0-6.el9_7.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.15.0-6.el9_7.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.15.0-6.el9_7.1.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.15.0-6.el9_7.1.ppc64le",
"product_id": "tigervnc-server-module-0:1.15.0-6.el9_7.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.15.0-6.el9_7.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.15.0-6.el9_7.1.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.15.0-6.el9_7.1.ppc64le",
"product_id": "tigervnc-debugsource-0:1.15.0-6.el9_7.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.15.0-6.el9_7.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.15.0-6.el9_7.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.15.0-6.el9_7.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.15.0-6.el9_7.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.15.0-6.el9_7.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.15.0-6.el9_7.1.x86_64",
"product": {
"name": "tigervnc-0:1.15.0-6.el9_7.1.x86_64",
"product_id": "tigervnc-0:1.15.0-6.el9_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.15.0-6.el9_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.15.0-6.el9_7.1.x86_64",
"product": {
"name": "tigervnc-server-0:1.15.0-6.el9_7.1.x86_64",
"product_id": "tigervnc-server-0:1.15.0-6.el9_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.15.0-6.el9_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.15.0-6.el9_7.1.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.15.0-6.el9_7.1.x86_64",
"product_id": "tigervnc-server-minimal-0:1.15.0-6.el9_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.15.0-6.el9_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.15.0-6.el9_7.1.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.15.0-6.el9_7.1.x86_64",
"product_id": "tigervnc-server-module-0:1.15.0-6.el9_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.15.0-6.el9_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.15.0-6.el9_7.1.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.15.0-6.el9_7.1.x86_64",
"product_id": "tigervnc-debugsource-0:1.15.0-6.el9_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.15.0-6.el9_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"product_id": "tigervnc-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.15.0-6.el9_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.15.0-6.el9_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.15.0-6.el9_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.15.0-6.el9_7.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.15.0-6.el9_7.1.s390x",
"product": {
"name": "tigervnc-0:1.15.0-6.el9_7.1.s390x",
"product_id": "tigervnc-0:1.15.0-6.el9_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.15.0-6.el9_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.15.0-6.el9_7.1.s390x",
"product": {
"name": "tigervnc-server-0:1.15.0-6.el9_7.1.s390x",
"product_id": "tigervnc-server-0:1.15.0-6.el9_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.15.0-6.el9_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.15.0-6.el9_7.1.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.15.0-6.el9_7.1.s390x",
"product_id": "tigervnc-server-minimal-0:1.15.0-6.el9_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.15.0-6.el9_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.15.0-6.el9_7.1.s390x",
"product": {
"name": "tigervnc-server-module-0:1.15.0-6.el9_7.1.s390x",
"product_id": "tigervnc-server-module-0:1.15.0-6.el9_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.15.0-6.el9_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.15.0-6.el9_7.1.s390x",
"product": {
"name": "tigervnc-debugsource-0:1.15.0-6.el9_7.1.s390x",
"product_id": "tigervnc-debugsource-0:1.15.0-6.el9_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.15.0-6.el9_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"product_id": "tigervnc-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.15.0-6.el9_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"product": {
"name": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"product_id": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.15.0-6.el9_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.15.0-6.el9_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"product_id": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.15.0-6.el9_7.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.15.0-6.el9_7.1.noarch",
"product": {
"name": "tigervnc-icons-0:1.15.0-6.el9_7.1.noarch",
"product_id": "tigervnc-icons-0:1.15.0-6.el9_7.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.15.0-6.el9_7.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.15.0-6.el9_7.1.noarch",
"product": {
"name": "tigervnc-license-0:1.15.0-6.el9_7.1.noarch",
"product_id": "tigervnc-license-0:1.15.0-6.el9_7.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.15.0-6.el9_7.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.15.0-6.el9_7.1.noarch",
"product": {
"name": "tigervnc-selinux-0:1.15.0-6.el9_7.1.noarch",
"product_id": "tigervnc-selinux-0:1.15.0-6.el9_7.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.15.0-6.el9_7.1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.15.0-6.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.aarch64"
},
"product_reference": "tigervnc-0:1.15.0-6.el9_7.1.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.15.0-6.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.ppc64le"
},
"product_reference": "tigervnc-0:1.15.0-6.el9_7.1.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.15.0-6.el9_7.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.s390x"
},
"product_reference": "tigervnc-0:1.15.0-6.el9_7.1.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.15.0-6.el9_7.1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.src"
},
"product_reference": "tigervnc-0:1.15.0-6.el9_7.1.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.15.0-6.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.x86_64"
},
"product_reference": "tigervnc-0:1.15.0-6.el9_7.1.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.15.0-6.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.aarch64"
},
"product_reference": "tigervnc-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.15.0-6.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.15.0-6.el9_7.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.15.0-6.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.15.0-6.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.aarch64"
},
"product_reference": "tigervnc-debugsource-0:1.15.0-6.el9_7.1.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.15.0-6.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.15.0-6.el9_7.1.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.15.0-6.el9_7.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.s390x"
},
"product_reference": "tigervnc-debugsource-0:1.15.0-6.el9_7.1.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.15.0-6.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.15.0-6.el9_7.1.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.15.0-6.el9_7.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.1.noarch"
},
"product_reference": "tigervnc-icons-0:1.15.0-6.el9_7.1.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.15.0-6.el9_7.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.1.noarch"
},
"product_reference": "tigervnc-license-0:1.15.0-6.el9_7.1.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.15.0-6.el9_7.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.1.noarch"
},
"product_reference": "tigervnc-selinux-0:1.15.0-6.el9_7.1.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.15.0-6.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.aarch64"
},
"product_reference": "tigervnc-server-0:1.15.0-6.el9_7.1.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.15.0-6.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.ppc64le"
},
"product_reference": "tigervnc-server-0:1.15.0-6.el9_7.1.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.15.0-6.el9_7.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.s390x"
},
"product_reference": "tigervnc-server-0:1.15.0-6.el9_7.1.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.15.0-6.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.x86_64"
},
"product_reference": "tigervnc-server-0:1.15.0-6.el9_7.1.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.aarch64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.s390x"
},
"product_reference": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.15.0-6.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.aarch64"
},
"product_reference": "tigervnc-server-minimal-0:1.15.0-6.el9_7.1.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.15.0-6.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.15.0-6.el9_7.1.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.15.0-6.el9_7.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.15.0-6.el9_7.1.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.15.0-6.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.15.0-6.el9_7.1.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.aarch64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.s390x"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.15.0-6.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.aarch64"
},
"product_reference": "tigervnc-server-module-0:1.15.0-6.el9_7.1.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.15.0-6.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.15.0-6.el9_7.1.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.15.0-6.el9_7.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.s390x"
},
"product_reference": "tigervnc-server-module-0:1.15.0-6.el9_7.1.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.15.0-6.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.15.0-6.el9_7.1.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.aarch64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.s390x"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "TrendAI Zero Day Initiative"
}
],
"cve": "CVE-2026-33999",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"discovery_date": "2026-03-25T06:29:19.544586+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451106"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server. This integer underflow vulnerability, specifically in the XKB compatibility map handling, allows an attacker with local or remote X11 server access to trigger a buffer read overrun. This can lead to memory-safety violations and potentially a denial of service (DoS) or other severe impacts.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "An Important integer underflow vulnerability exists in the X.Org X server\u0027s XKB compatibility map handling. This flaw allows an attacker with local or remote X11 server access to trigger a buffer read overrun, leading to memory-safety violations and potential denial of service. Red Hat Enterprise Linux systems utilizing the X.Org X server in graphical environments are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33999"
},
{
"category": "external",
"summary": "RHBZ#2451106",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451106"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33999"
}
],
"release_date": "2026-04-23T14:11:12.550000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-27T08:36:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10739"
},
{
"category": "workaround",
"details": "To mitigate this issue, restrict access to the X11 server. For remote access, disable X11 forwarding in SSH configurations if not required. Edit `/etc/ssh/sshd_config` and set `X11Forwarding no`. After modifying the configuration, restart the `sshd` service using `systemctl restart sshd`. Disabling X11 forwarding may impact remote graphical applications.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "TrendAI Zero Day Initiative"
}
],
"cve": "CVE-2026-34001",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2026-03-25T07:00:05.329048+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451109"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit this without user interaction, leading to a server crash and potentially enabling memory corruption. This could result in a denial of service or further compromise of the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Important: This use-after-free vulnerability in the X.Org X server\u0027s XSYNC fence triggering logic can lead to a server crash and potential memory corruption. Exploitation requires an attacker to have access to the X11 server, typically limited to local users or trusted remote connections. Systems not running the X.Org X server are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-34001"
},
{
"category": "external",
"summary": "RHBZ#2451109",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451109"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-34001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-34001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34001"
}
],
"release_date": "2026-04-23T14:14:42.224000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-27T08:36:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10739"
},
{
"category": "workaround",
"details": "To mitigate this issue, restrict access to the X11 server to trusted users and networks. If the X.Org X server is not required, consider disabling or uninstalling it. For environments where the X server is essential, running X applications within a sandboxed environment can help reduce the attack surface.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "TrendAI Zero Day Initiative"
}
],
"cve": "CVE-2026-34003",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2026-03-25T07:19:13.949261+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451113"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server\u0027s XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "An Important out-of-bounds memory access vulnerability exists in the X.Org X server\u0027s XKB key types request validation. This flaw could lead to information exposure or a server crash and requires a specially crafted request to trigger. Systems running a graphical environment are potentially affected, with higher impact outcomes possible in certain configurations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-34003"
},
{
"category": "external",
"summary": "RHBZ#2451113",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451113"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-34003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34003"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-34003",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34003"
}
],
"release_date": "2026-04-23T14:18:00.653000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-27T08:36:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10739"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access"
},
{
"cve": "CVE-2026-34352",
"cwe": {
"id": "CWE-279",
"name": "Incorrect Execution-Assigned Permissions"
},
"discovery_date": "2026-03-26T23:01:46.925344+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2452022"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in TigerVNC\u0027s x0vncserver component. Due to incorrect permissions in the Image.cxx file, other users on the system can observe or manipulate the screen contents of a running session. This vulnerability could also lead to an application crash, resulting in a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "TigerVNC: x0vncserver: TigerVNC x0vncserver: Information disclosure, data manipulation, and denial of service via incorrect permissions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-34352"
},
{
"category": "external",
"summary": "RHBZ#2452022",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2452022"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-34352",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34352"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-34352",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34352"
},
{
"category": "external",
"summary": "https://github.com/TigerVNC/tigervnc/commit/0b5cab169d847789efa54459a87659d3fd484393",
"url": "https://github.com/TigerVNC/tigervnc/commit/0b5cab169d847789efa54459a87659d3fd484393"
},
{
"category": "external",
"summary": "https://groups.google.com/g/tigervnc-announce/c/anHL9WLshLI",
"url": "https://groups.google.com/g/tigervnc-announce/c/anHL9WLshLI"
},
{
"category": "external",
"summary": "https://sourceforge.net/projects/tigervnc/files/stable/1.16.2",
"url": "https://sourceforge.net/projects/tigervnc/files/stable/1.16.2"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2026/03/26/7",
"url": "https://www.openwall.com/lists/oss-security/2026/03/26/7"
}
],
"release_date": "2026-03-26T22:30:46.928000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-27T08:36:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:10739"
},
{
"category": "workaround",
"details": "The x0vncserver component should be disabled if not actively required. If x0vncserver is necessary, ensure that only trusted users have access to the system where it is running. To disable the x0vncserver service, if it is running as a systemd service, you can use: `sudo systemctl stop x0vncserver.service` `sudo systemctl disable x0vncserver.service` If x0vncserver is launched manually, avoid running it in multi-user environments. A service restart or system reboot may be required for changes to take full effect.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.src",
"AppStream-9.7.0.Z.MAIN:tigervnc-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-debugsource-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-icons-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-license-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-selinux-0:1.15.0-6.el9_7.1.noarch",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-0:1.15.0-6.el9_7.1.x86_64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.aarch64",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.ppc64le",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.s390x",
"AppStream-9.7.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.15.0-6.el9_7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "TigerVNC: x0vncserver: TigerVNC x0vncserver: Information disclosure, data manipulation, and denial of service via incorrect permissions"
}
]
}
RHSA-2026:11692
Vulnerability from csaf_redhat - Published: 2026-04-29 13:20 - Updated: 2026-04-29 18:27A flaw was found in the X.Org X server. This integer underflow vulnerability, specifically in the XKB compatibility map handling, allows an attacker with local or remote X11 server access to trigger a buffer read overrun. This can lead to memory-safety violations and potentially a denial of service (DoS) or other severe impacts.
A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit this without user interaction, leading to a server crash and potentially enabling memory corruption. This could result in a denial of service or further compromise of the system.
A flaw was found in the X.Org X server's XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for xorg-x11-server is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.\n\nSecurity Fix(es):\n\n* xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999)\n\n* xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001)\n\n* xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:11692",
"url": "https://access.redhat.com/errata/RHSA-2026:11692"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2451106",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451106"
},
{
"category": "external",
"summary": "2451109",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451109"
},
{
"category": "external",
"summary": "2451113",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451113"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_11692.json"
}
],
"title": "Red Hat Security Advisory: xorg-x11-server security update",
"tracking": {
"current_release_date": "2026-04-29T18:27:44+00:00",
"generator": {
"date": "2026-04-29T18:27:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:11692",
"initial_release_date": "2026-04-29T13:20:55+00:00",
"revision_history": [
{
"date": "2026-04-29T13:20:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-29T13:20:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T18:27:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-0:1.20.11-28.el8_10.src",
"product": {
"name": "xorg-x11-server-0:1.20.11-28.el8_10.src",
"product_id": "xorg-x11-server-0:1.20.11-28.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server@1.20.11-28.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-28.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-28.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-28.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-28.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-28.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"product_id": "xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-28.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-28.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-28.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-28.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-28.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-28.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-28.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-28.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"product_id": "xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-28.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-28.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-28.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-28.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-28.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-28.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"product_id": "xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-28.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-28.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-28.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-28.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-28.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-28.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-28.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-28.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"product_id": "xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-28.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-28.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-28.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-28.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-28.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-28.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"product_id": "xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-28.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-28.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-28.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-28.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-28.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-28.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-28.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-28.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"product_id": "xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-28.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-28.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-28.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-28.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-28.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-28.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"product_id": "xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-28.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-28.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-28.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-28.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-28.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-28.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-28.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-28.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"product_id": "xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-28.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"product_id": "xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-28.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-28.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-28.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-28.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-28.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-28.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-28.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-28.el8_10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-source-0:1.20.11-28.el8_10.noarch",
"product": {
"name": "xorg-x11-server-source-0:1.20.11-28.el8_10.noarch",
"product_id": "xorg-x11-server-source-0:1.20.11-28.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-source@1.20.11-28.el8_10?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.11-28.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-28.el8_10.src"
},
"product_reference": "xorg-x11-server-0:1.20.11-28.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-28.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.11-28.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-28.el8_10.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.11-28.el8_10.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.11-28.el8_10.src as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-28.el8_10.src"
},
"product_reference": "xorg-x11-server-0:1.20.11-28.el8_10.src",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-28.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.11-28.el8_10.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-28.el8_10.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.11-28.el8_10.noarch",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "TrendAI Zero Day Initiative"
}
],
"cve": "CVE-2026-33999",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"discovery_date": "2026-03-25T06:29:19.544586+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451106"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server. This integer underflow vulnerability, specifically in the XKB compatibility map handling, allows an attacker with local or remote X11 server access to trigger a buffer read overrun. This can lead to memory-safety violations and potentially a denial of service (DoS) or other severe impacts.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "An Important integer underflow vulnerability exists in the X.Org X server\u0027s XKB compatibility map handling. This flaw allows an attacker with local or remote X11 server access to trigger a buffer read overrun, leading to memory-safety violations and potential denial of service. Red Hat Enterprise Linux systems utilizing the X.Org X server in graphical environments are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-28.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-28.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-28.el8_10.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33999"
},
{
"category": "external",
"summary": "RHBZ#2451106",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451106"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33999"
}
],
"release_date": "2026-04-23T14:11:12.550000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T13:20:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-28.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-28.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-28.el8_10.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11692"
},
{
"category": "workaround",
"details": "To mitigate this issue, restrict access to the X11 server. For remote access, disable X11 forwarding in SSH configurations if not required. Edit `/etc/ssh/sshd_config` and set `X11Forwarding no`. After modifying the configuration, restart the `sshd` service using `systemctl restart sshd`. Disabling X11 forwarding may impact remote graphical applications.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-28.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-28.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-28.el8_10.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-28.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-28.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-28.el8_10.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "TrendAI Zero Day Initiative"
}
],
"cve": "CVE-2026-34001",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2026-03-25T07:00:05.329048+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451109"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit this without user interaction, leading to a server crash and potentially enabling memory corruption. This could result in a denial of service or further compromise of the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Important: This use-after-free vulnerability in the X.Org X server\u0027s XSYNC fence triggering logic can lead to a server crash and potential memory corruption. Exploitation requires an attacker to have access to the X11 server, typically limited to local users or trusted remote connections. Systems not running the X.Org X server are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-28.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-28.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-28.el8_10.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-34001"
},
{
"category": "external",
"summary": "RHBZ#2451109",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451109"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-34001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-34001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34001"
}
],
"release_date": "2026-04-23T14:14:42.224000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T13:20:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-28.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-28.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-28.el8_10.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11692"
},
{
"category": "workaround",
"details": "To mitigate this issue, restrict access to the X11 server to trusted users and networks. If the X.Org X server is not required, consider disabling or uninstalling it. For environments where the X server is essential, running X applications within a sandboxed environment can help reduce the attack surface.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-28.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-28.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-28.el8_10.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-28.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-28.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-28.el8_10.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "TrendAI Zero Day Initiative"
}
],
"cve": "CVE-2026-34003",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2026-03-25T07:19:13.949261+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451113"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server\u0027s XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "An Important out-of-bounds memory access vulnerability exists in the X.Org X server\u0027s XKB key types request validation. This flaw could lead to information exposure or a server crash and requires a specially crafted request to trigger. Systems running a graphical environment are potentially affected, with higher impact outcomes possible in certain configurations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-28.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-28.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-28.el8_10.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-34003"
},
{
"category": "external",
"summary": "RHBZ#2451113",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451113"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-34003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34003"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-34003",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34003"
}
],
"release_date": "2026-04-23T14:18:00.653000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T13:20:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-28.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-28.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-28.el8_10.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11692"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-28.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-28.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-28.el8_10.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-28.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-28.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-28.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-28.el8_10.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access"
}
]
}
RHSA-2026:11656
Vulnerability from csaf_redhat - Published: 2026-04-29 12:10 - Updated: 2026-04-29 18:27A flaw was found in the X.Org X server. This integer underflow vulnerability, specifically in the XKB compatibility map handling, allows an attacker with local or remote X11 server access to trigger a buffer read overrun. This can lead to memory-safety violations and potentially a denial of service (DoS) or other severe impacts.
A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit this without user interaction, leading to a server crash and potentially enabling memory corruption. This could result in a denial of service or further compromise of the system.
A flaw was found in the X.Org X server's XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Xwayland is an X server for running X clients under Wayland.\n\nSecurity Fix(es):\n\n* xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999)\n\n* xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001)\n\n* xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:11656",
"url": "https://access.redhat.com/errata/RHSA-2026:11656"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2451106",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451106"
},
{
"category": "external",
"summary": "2451109",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451109"
},
{
"category": "external",
"summary": "2451113",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451113"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_11656.json"
}
],
"title": "Red Hat Security Advisory: xorg-x11-server-Xwayland security update",
"tracking": {
"current_release_date": "2026-04-29T18:27:43+00:00",
"generator": {
"date": "2026-04-29T18:27:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:11656",
"initial_release_date": "2026-04-29T12:10:30+00:00",
"revision_history": [
{
"date": "2026-04-29T12:10:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-29T12:10:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T18:27:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.src",
"product": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.src",
"product_id": "xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-20.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.aarch64",
"product_id": "xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-20.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.aarch64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-20.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.aarch64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-20.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.ppc64le",
"product_id": "xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-20.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-20.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-20.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.x86_64",
"product_id": "xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-20.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.x86_64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-20.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.x86_64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-20.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.s390x",
"product_id": "xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-20.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.s390x",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-20.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.s390x",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-20.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.src"
},
"product_reference": "xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "TrendAI Zero Day Initiative"
}
],
"cve": "CVE-2026-33999",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"discovery_date": "2026-03-25T06:29:19.544586+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451106"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server. This integer underflow vulnerability, specifically in the XKB compatibility map handling, allows an attacker with local or remote X11 server access to trigger a buffer read overrun. This can lead to memory-safety violations and potentially a denial of service (DoS) or other severe impacts.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "An Important integer underflow vulnerability exists in the X.Org X server\u0027s XKB compatibility map handling. This flaw allows an attacker with local or remote X11 server access to trigger a buffer read overrun, leading to memory-safety violations and potential denial of service. Red Hat Enterprise Linux systems utilizing the X.Org X server in graphical environments are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33999"
},
{
"category": "external",
"summary": "RHBZ#2451106",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451106"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33999"
}
],
"release_date": "2026-04-23T14:11:12.550000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T12:10:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11656"
},
{
"category": "workaround",
"details": "To mitigate this issue, restrict access to the X11 server. For remote access, disable X11 forwarding in SSH configurations if not required. Edit `/etc/ssh/sshd_config` and set `X11Forwarding no`. After modifying the configuration, restart the `sshd` service using `systemctl restart sshd`. Disabling X11 forwarding may impact remote graphical applications.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "TrendAI Zero Day Initiative"
}
],
"cve": "CVE-2026-34001",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2026-03-25T07:00:05.329048+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451109"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit this without user interaction, leading to a server crash and potentially enabling memory corruption. This could result in a denial of service or further compromise of the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Important: This use-after-free vulnerability in the X.Org X server\u0027s XSYNC fence triggering logic can lead to a server crash and potential memory corruption. Exploitation requires an attacker to have access to the X11 server, typically limited to local users or trusted remote connections. Systems not running the X.Org X server are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-34001"
},
{
"category": "external",
"summary": "RHBZ#2451109",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451109"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-34001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-34001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34001"
}
],
"release_date": "2026-04-23T14:14:42.224000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T12:10:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11656"
},
{
"category": "workaround",
"details": "To mitigate this issue, restrict access to the X11 server to trusted users and networks. If the X.Org X server is not required, consider disabling or uninstalling it. For environments where the X server is essential, running X applications within a sandboxed environment can help reduce the attack surface.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "TrendAI Zero Day Initiative"
}
],
"cve": "CVE-2026-34003",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2026-03-25T07:19:13.949261+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2451113"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org X server\u0027s XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "An Important out-of-bounds memory access vulnerability exists in the X.Org X server\u0027s XKB key types request validation. This flaw could lead to information exposure or a server crash and requires a specially crafted request to trigger. Systems running a graphical environment are potentially affected, with higher impact outcomes possible in certain configurations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-34003"
},
{
"category": "external",
"summary": "RHBZ#2451113",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451113"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-34003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34003"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-34003",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34003"
}
],
"release_date": "2026-04-23T14:18:00.653000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T12:10:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11656"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-20.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-20.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-20.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access"
}
]
}
alsa-2026:10739
Vulnerability from osv_almalinux
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
- xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999)
- xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001)
- xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003)
- TigerVNC: x0vncserver: TigerVNC x0vncserver: Information disclosure, data manipulation, and denial of service via incorrect permissions (CVE-2026-34352)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "tigervnc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.15.0-6.el9_7.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "tigervnc-icons"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.15.0-6.el9_7.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "tigervnc-license"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.15.0-6.el9_7.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "tigervnc-selinux"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.15.0-6.el9_7.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "tigervnc-server"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.15.0-6.el9_7.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "tigervnc-server-minimal"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.15.0-6.el9_7.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "tigervnc-server-module"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.15.0-6.el9_7.1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. \n\nSecurity Fix(es): \n\n * xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999)\n * xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001)\n * xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003)\n * TigerVNC: x0vncserver: TigerVNC x0vncserver: Information disclosure, data manipulation, and denial of service via incorrect permissions (CVE-2026-34352)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2026:10739",
"modified": "2026-04-28T13:27:18Z",
"published": "2026-04-27T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2026:10739"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-33999"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-34001"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-34003"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-34352"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2451106"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2451109"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2451113"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2452022"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2026-10739.html"
}
],
"related": [
"CVE-2026-33999",
"CVE-2026-34001",
"CVE-2026-34003",
"CVE-2026-34352"
],
"summary": "Important: tigervnc security update"
}
alsa-2026:11369
Vulnerability from osv_almalinux
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
- xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999)
- xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001)
- xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "xorg-x11-server-Xwayland"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "23.2.7-6.el9_7"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "xorg-x11-server-Xwayland-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "23.2.7-6.el9_7"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Xwayland is an X server for running X clients under Wayland. \n\nSecurity Fix(es): \n\n * xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999)\n * xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001)\n * xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2026:11369",
"modified": "2026-04-29T08:45:59Z",
"published": "2026-04-28T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2026:11369"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-33999"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-34001"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-34003"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2451106"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2451109"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2451113"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2026-11369.html"
}
],
"related": [
"CVE-2026-33999",
"CVE-2026-34001",
"CVE-2026-34003"
],
"summary": "Important: xorg-x11-server-Xwayland security update"
}
alsa-2026:11692
Vulnerability from osv_almalinux
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
- xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999)
- xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001)
- xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "xorg-x11-server-Xdmx"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.20.11-28.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "xorg-x11-server-Xephyr"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.20.11-28.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "xorg-x11-server-Xnest"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.20.11-28.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "xorg-x11-server-Xorg"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.20.11-28.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "xorg-x11-server-Xvfb"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.20.11-28.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "xorg-x11-server-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.20.11-28.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "xorg-x11-server-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.20.11-28.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "xorg-x11-server-source"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.20.11-28.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. \n\nSecurity Fix(es): \n\n * xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999)\n * xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001)\n * xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2026:11692",
"modified": "2026-04-30T07:07:01Z",
"published": "2026-04-29T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2026:11692"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-33999"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-34001"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-34003"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2451106"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2451109"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2451113"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2026-11692.html"
}
],
"related": [
"CVE-2026-33999",
"CVE-2026-34001",
"CVE-2026-34003"
],
"summary": "Important: xorg-x11-server security update"
}
alsa-2026:11352
Vulnerability from osv_almalinux
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
- xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999)
- xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001)
- xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "xorg-x11-server-Xwayland"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "24.1.5-6.el10_1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "xorg-x11-server-Xwayland-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "24.1.5-6.el10_1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Xwayland is an X server for running X clients under Wayland. \n\nSecurity Fix(es): \n\n * xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999)\n * xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001)\n * xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2026:11352",
"modified": "2026-04-29T08:49:14Z",
"published": "2026-04-28T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2026:11352"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-33999"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-34001"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-34003"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2451106"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2451109"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2451113"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/10/ALSA-2026-11352.html"
}
],
"related": [
"CVE-2026-33999",
"CVE-2026-34001",
"CVE-2026-34003"
],
"summary": "Important: xorg-x11-server-Xwayland security update"
}
alsa-2026:11656
Vulnerability from osv_almalinux
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
- xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999)
- xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001)
- xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "xorg-x11-server-Xwayland"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "21.1.3-20.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Xwayland is an X server for running X clients under Wayland. \n\nSecurity Fix(es): \n\n * xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999)\n * xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001)\n * xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2026:11656",
"modified": "2026-04-30T07:03:37Z",
"published": "2026-04-29T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2026:11656"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-33999"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-34001"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-34003"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2451106"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2451109"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2451113"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2026-11656.html"
}
],
"related": [
"CVE-2026-33999",
"CVE-2026-34001",
"CVE-2026-34003"
],
"summary": "Important: xorg-x11-server-Xwayland security update"
}
alsa-2026:11388
Vulnerability from osv_almalinux
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
- xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999)
- xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001)
- xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "xorg-x11-server-Xdmx"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.20.11-33.el9_7"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "xorg-x11-server-Xephyr"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.20.11-33.el9_7"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "xorg-x11-server-Xnest"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.20.11-33.el9_7"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "xorg-x11-server-Xorg"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.20.11-33.el9_7"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "xorg-x11-server-Xvfb"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.20.11-33.el9_7"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "xorg-x11-server-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.20.11-33.el9_7"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "xorg-x11-server-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.20.11-33.el9_7"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "xorg-x11-server-source"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.20.11-33.el9_7"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. \n\nSecurity Fix(es): \n\n * xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999)\n * xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001)\n * xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2026:11388",
"modified": "2026-04-29T08:43:57Z",
"published": "2026-04-28T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2026:11388"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-33999"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-34001"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-34003"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2451106"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2451109"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2451113"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2026-11388.html"
}
],
"related": [
"CVE-2026-33999",
"CVE-2026-34001",
"CVE-2026-34003"
],
"summary": "Important: xorg-x11-server security update"
}
MSRC_CVE-2026-34003
Vulnerability from csaf_microsoft - Published: 2026-04-02 00:00 - Updated: 2026-04-29 01:11| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2026-34003 Xorg: xwayland: x.org x server: information exposure and denial of service via out-of-bounds memory access - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-34003.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Xorg: xwayland: x.org x server: information exposure and denial of service via out-of-bounds memory access",
"tracking": {
"current_release_date": "2026-04-29T01:11:30.000Z",
"generator": {
"date": "2026-04-29T07:32:41.760Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2026-34003",
"initial_release_date": "2026-04-02T00:00:00.000Z",
"revision_history": [
{
"date": "2026-04-29T01:11:30.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "cbl2 xorg-x11-server 0:1.20.10-16.cbl2",
"product": {
"name": "cbl2 xorg-x11-server 0:1.20.10-16.cbl2",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "xorg-x11-server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "azl3 xorg-x11-server-Xwayland 0:24.1.6-3.azl3",
"product": {
"name": "azl3 xorg-x11-server-Xwayland 0:24.1.6-3.azl3",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "xorg-x11-server-Xwayland"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 xorg-x11-server 0:1.20.10-16.cbl2 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 xorg-x11-server-Xwayland 0:24.1.6-3.azl3 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-34003",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "general",
"text": "redhat",
"title": "Assigning CNA"
}
],
"product_status": {
"known_affected": [
"17086-2",
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-34003 Xorg: xwayland: x.org x server: information exposure and denial of service via out-of-bounds memory access - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-34003.json"
}
],
"remediations": [
{
"category": "none_available",
"date": "2026-04-29T01:11:30.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17086-2"
]
},
{
"category": "none_available",
"date": "2026-04-29T01:11:30.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-1"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"17086-2",
"17084-1"
]
}
],
"title": "Xorg: xwayland: x.org x server: information exposure and denial of service via out-of-bounds memory access"
}
]
}
FKIE_CVE-2026-34003
Vulnerability from fkie_nvd - Published: 2026-04-23 16:16 - Updated: 2026-04-29 19:16| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:10739 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:11352 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:11369 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:11388 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:11656 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:11692 | ||
| secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2026-34003 | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2451113 |
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the X.Org X server\u0027s XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible."
}
],
"id": "CVE-2026-34003",
"lastModified": "2026-04-29T19:16:23.640",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
},
"published": "2026-04-23T16:16:24.920",
"references": [
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:10739"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:11352"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:11369"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:11388"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:11656"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:11692"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/security/cve/CVE-2026-34003"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451113"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
}
GHSA-5MQR-3465-C7P6
Vulnerability from github – Published: 2026-04-23 18:33 – Updated: 2026-04-23 18:33A flaw was found in the X.Org X server's XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible.
{
"affected": [],
"aliases": [
"CVE-2026-34003"
],
"database_specific": {
"cwe_ids": [
"CWE-125"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-04-23T16:16:24Z",
"severity": "HIGH"
},
"details": "A flaw was found in the X.Org X server\u0027s XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible.",
"id": "GHSA-5mqr-3465-c7p6",
"modified": "2026-04-23T18:33:03Z",
"published": "2026-04-23T18:33:03Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34003"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2026-34003"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451113"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.