[ALSA-2026:11369] Important: xorg-x11-server-Xwayland security update
Type:
security
Severity:
important
Release date:
2026-04-29
Description:
Xwayland is an X server for running X clients under Wayland. Security Fix(es): * xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999) * xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001) * xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 xorg-x11-server-Xwayland-23.2.7-6.el9_7.aarch64.rpm 57e3dc5de965c7cd3cbedf2a60700699b819c622b1c9c5b5c6241f93f129dddf
aarch64 xorg-x11-server-Xwayland-devel-23.2.7-6.el9_7.aarch64.rpm 7cbbb1baa199381f9a302c141ca3c5e809ff0af2b50f50f3855bfe477d5839ff
i686 xorg-x11-server-Xwayland-devel-23.2.7-6.el9_7.i686.rpm 751a261084e3ef22322e49a37708c7c154a22508ead508f85417fc7ce3b7cb6f
i686 xorg-x11-server-Xwayland-23.2.7-6.el9_7.i686.rpm eb68b7299d74c1c6ba8685797cc46823b4265a5f512344bfe517a5c14431c38a
ppc64le xorg-x11-server-Xwayland-23.2.7-6.el9_7.ppc64le.rpm 4b78134b49c305bb514a1fe7a2475256e77081e9f6c57c14a5dd6b98a8c8cbda
ppc64le xorg-x11-server-Xwayland-devel-23.2.7-6.el9_7.ppc64le.rpm 65f96d8ecb19fbe30ba198955feb5a2afe3f9b9f185f1d34bd6d5cc0ba49d683
s390x xorg-x11-server-Xwayland-devel-23.2.7-6.el9_7.s390x.rpm 528b1d40ad653e8ee2d306d0f3950b691c953d9c82be48b0f4341bec99d40550
s390x xorg-x11-server-Xwayland-23.2.7-6.el9_7.s390x.rpm b1c0cec7413f1b18b834394ae6ead17fd99d55db4b0e6b68c33bcc6c847b8d06
x86_64 xorg-x11-server-Xwayland-devel-23.2.7-6.el9_7.x86_64.rpm c9976024892013a78cccde63150c9bccb59e469b33b821befcad26d2dd757284
x86_64 xorg-x11-server-Xwayland-23.2.7-6.el9_7.x86_64.rpm f9feb48fd305ae8eb7883de3656042ecb4bfe8b0bf5d01c61361c91e031dea0d
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.