Логотип exploitDog
bind:"CVE-2021-3782"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2021-3782"

Количество 12

Количество 12

ubuntu логотип

CVE-2021-3782

почти 3 года назад

An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.

CVSS3: 6.6
EPSS: Низкий
redhat логотип

CVE-2021-3782

около 3 лет назад

An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.

CVSS3: 6.6
EPSS: Низкий
nvd логотип

CVE-2021-3782

почти 3 года назад

An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.

CVSS3: 6.6
EPSS: Низкий
msrc логотип

CVE-2021-3782

почти 3 года назад

CVSS3: 6.6
EPSS: Низкий
debian логотип

CVE-2021-3782

почти 3 года назад

An internal reference count is held on the buffer pool, incremented ev ...

CVSS3: 6.6
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1874-1

больше 2 лет назад

Security update for wayland

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1873-1

больше 2 лет назад

Security update for wayland

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1864-1

больше 2 лет назад

Security update for wayland

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1860-1

больше 2 лет назад

Security update for wayland

EPSS: Низкий
github логотип

GHSA-pvw2-9h4r-c5cr

почти 3 года назад

An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.

CVSS3: 9.8
EPSS: Низкий
oracle-oval логотип

ELSA-2023-2786

больше 2 лет назад

ELSA-2023-2786: wayland security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2024-07302

около 4 лет назад

Уязвимость протокола коммуникации между клиентом и композитором Wayland, связанная с целочисленным переполнением, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 6.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-3782

An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.

CVSS3: 6.6
0%
Низкий
почти 3 года назад
redhat логотип
CVE-2021-3782

An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.

CVSS3: 6.6
0%
Низкий
около 3 лет назад
nvd логотип
CVE-2021-3782

An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.

CVSS3: 6.6
0%
Низкий
почти 3 года назад
msrc логотип
CVSS3: 6.6
0%
Низкий
почти 3 года назад
debian логотип
CVE-2021-3782

An internal reference count is held on the buffer pool, incremented ev ...

CVSS3: 6.6
0%
Низкий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:1874-1

Security update for wayland

0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1873-1

Security update for wayland

0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1864-1

Security update for wayland

0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1860-1

Security update for wayland

0%
Низкий
больше 2 лет назад
github логотип
GHSA-pvw2-9h4r-c5cr

An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.

CVSS3: 9.8
0%
Низкий
почти 3 года назад
oracle-oval логотип
ELSA-2023-2786

ELSA-2023-2786: wayland security, bug fix, and enhancement update (MODERATE)

больше 2 лет назад
fstec логотип
BDU:2024-07302

Уязвимость протокола коммуникации между клиентом и композитором Wayland, связанная с целочисленным переполнением, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 6.6
0%
Низкий
около 4 лет назад

Уязвимостей на страницу