Description
A flaw was found in the X.Org X server's XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible.
Published: 2026-04-23
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Information Exposure or Denial of Service via out‑of‑bounds memory access
Action: Apply Patch
AI Analysis

Impact

The flaw resides in the X.Org X server’s XKB key types request validation, allowing a local attacker to send a crafted request that triggers an out‑of‑bounds read. This can expose sensitive information from memory or cause the X server to crash, resulting in a denial of service. The vulnerability is mitigated by correct bounds checking during request processing, but the current implementation fails to enforce it, exposing the system to data leakage or service interruption.

Affected Systems

The issue affects Red Hat Enterprise Linux 6, 7, 8, 9, and 10, which rely on the X.Org X server as part of the graphical stack. Versions impacted are those distributed under the standard RHEL releases and are listed in the corresponding Red Hat errata.

Risk and Exploitability

The CVSS score of 7.8 indicates a high severity level, and the EPSS score of < 1% suggests a low probability of current exploitation in the wild. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Based on the description, the likely attack vector is local; an attacker with access to the X server process or the ability to send network–level requests to the X server can craft the malicious input. The impact is therefore confined to systems where the X server is running, and exploitation requires local or at‑least network‑level access to the X server within the same host.

Generated by OpenCVE AI on April 28, 2026 at 07:34 UTC.

Remediation

Vendor Workaround

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.


OpenCVE Recommended Actions

  • Install the Red Hat security update RHSA‑2026:10739, which contains the fix for the X server XKB request validation
  • Restrict non‑trusted users from running or accessing the X server process, limiting local attack surface
  • Verify that the XFY configuration is set to use the latest XKB libraries and reboot the system after applying the update

Generated by OpenCVE AI on April 28, 2026 at 07:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 13:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:8
References

Wed, 29 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
References

Wed, 29 Apr 2026 13:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:enterprise_linux:8::appstream
cpe:/a:redhat:enterprise_linux:8::crb
References

Tue, 28 Apr 2026 22:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:9
References

Tue, 28 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:enterprise_linux:9::crb
References

Tue, 28 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:10.1
References

Tue, 28 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared X.org
X.org x.org
Vendors & Products X.org
X.org x.org

Mon, 27 Apr 2026 10:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:enterprise_linux:9::appstream
References

Fri, 24 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Thu, 23 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
Description A flaw was found in the X.Org X server's XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash, leading to a Denial of Service (DoS). In certain configurations, higher impact outcomes may be possible.
Title Xorg: xwayland: x.org x server: information exposure and denial of service via out-of-bounds memory access
First Time appeared Redhat
Redhat enterprise Linux
Weaknesses CWE-125
CPEs cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Redhat Enterprise Linux
X.org X.org
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-05-04T12:38:28.602Z

Reserved: 2026-03-25T04:53:13.615Z

Link: CVE-2026-34003

cve-icon Vulnrichment

Updated: 2026-04-23T17:20:44.391Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-23T16:16:24.920

Modified: 2026-05-04T13:16:00.803

Link: CVE-2026-34003

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-23T14:18:00Z

Links: CVE-2026-34003 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T09:25:58Z

Weaknesses