Количество 12
Количество 12

CVE-2021-3782
An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.

CVE-2021-3782
An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.

CVE-2021-3782
An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.

CVE-2021-3782
CVE-2021-3782
An internal reference count is held on the buffer pool, incremented ev ...

SUSE-SU-2023:1874-1
Security update for wayland

SUSE-SU-2023:1873-1
Security update for wayland

SUSE-SU-2023:1864-1
Security update for wayland

SUSE-SU-2023:1860-1
Security update for wayland
GHSA-pvw2-9h4r-c5cr
An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.
ELSA-2023-2786
ELSA-2023-2786: wayland security, bug fix, and enhancement update (MODERATE)

BDU:2024-07302
Уязвимость протокола коммуникации между клиентом и композитором Wayland, связанная с целочисленным переполнением, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2021-3782 An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time. | CVSS3: 6.6 | 0% Низкий | почти 3 года назад |
![]() | CVE-2021-3782 An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time. | CVSS3: 6.6 | 0% Низкий | около 3 лет назад |
![]() | CVE-2021-3782 An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time. | CVSS3: 6.6 | 0% Низкий | почти 3 года назад |
![]() | CVSS3: 6.6 | 0% Низкий | почти 3 года назад | |
CVE-2021-3782 An internal reference count is held on the buffer pool, incremented ev ... | CVSS3: 6.6 | 0% Низкий | почти 3 года назад | |
![]() | SUSE-SU-2023:1874-1 Security update for wayland | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2023:1873-1 Security update for wayland | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2023:1864-1 Security update for wayland | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2023:1860-1 Security update for wayland | 0% Низкий | больше 2 лет назад | |
GHSA-pvw2-9h4r-c5cr An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time. | CVSS3: 9.8 | 0% Низкий | почти 3 года назад | |
ELSA-2023-2786 ELSA-2023-2786: wayland security, bug fix, and enhancement update (MODERATE) | больше 2 лет назад | |||
![]() | BDU:2024-07302 Уязвимость протокола коммуникации между клиентом и композитором Wayland, связанная с целочисленным переполнением, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании | CVSS3: 6.6 | 0% Низкий | около 4 лет назад |
Уязвимостей на страницу