Description
A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit this without user interaction, leading to a server crash and potentially enabling memory corruption. This could result in a denial of service or further compromise of the system.
Problem types
Product status
0:24.1.5-6.el10_1 (rpm) before *
0:1.20.11-28.el8_10 (rpm) before *
0:1.15.0-6.el9_7.1 (rpm) before *
0:23.2.7-6.el9_7 (rpm) before *
0:1.20.11-33.el9_7 (rpm) before *
Timeline
| 2026-03-25: | Reported to Red Hat. |
| 2026-04-23: | Made public. |
Credits
Red Hat would like to thank Jan-Niklas Sohn (TrendAI Zero Day Initiative) for reporting this issue.
References
access.redhat.com/errata/RHSA-2026:10739 (RHSA-2026:10739)
access.redhat.com/errata/RHSA-2026:11352 (RHSA-2026:11352)
access.redhat.com/errata/RHSA-2026:11369 (RHSA-2026:11369)
access.redhat.com/errata/RHSA-2026:11388 (RHSA-2026:11388)
access.redhat.com/errata/RHSA-2026:11692 (RHSA-2026:11692)
access.redhat.com/security/cve/CVE-2026-34001
bugzilla.redhat.com/show_bug.cgi?id=2451109 (RHBZ#2451109)