Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2023-2786

Опубликовано: 24 мая 2023
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2023-2786: wayland security, bug fix, and enhancement update (MODERATE)

[1.21.0-1]

  • wayland 1.21.0 (rhbz#2137625)

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

libwayland-client

1.21.0-1.el8

libwayland-cursor

1.21.0-1.el8

libwayland-egl

1.21.0-1.el8

libwayland-server

1.21.0-1.el8

wayland-devel

1.21.0-1.el8

Oracle Linux x86_64

libwayland-client

1.21.0-1.el8

libwayland-cursor

1.21.0-1.el8

libwayland-egl

1.21.0-1.el8

libwayland-server

1.21.0-1.el8

wayland-devel

1.21.0-1.el8

Связанные CVE

Связанные уязвимости

CVSS3: 6.6
ubuntu
почти 3 года назад

An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.

CVSS3: 6.6
redhat
около 3 лет назад

An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.

CVSS3: 6.6
nvd
почти 3 года назад

An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.

CVSS3: 6.6
msrc
почти 3 года назад

Описание отсутствует

CVSS3: 6.6
debian
почти 3 года назад

An internal reference count is held on the buffer pool, incremented ev ...