6.6
CVSSv3

CVE-2021-3782

Published: 23/09/2022 Updated: 07/11/2023
CVSS v3 Base Score: 6.6 | Impact Score: 4.7 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wayland wayland

Vendor Advisories

概述 Moderate: wayland security, bug fix, and enhancement update 类型/严重性 Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems 标题 An update for wayland is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rate ...
Synopsis Moderate: Migration Toolkit for Runtimes security update Type/Severity Security Advisory: Moderate Topic An update for mtr-operator-bundle-container, mtr-operator-container, mtr-web-container, and mtr-web-executor-container is now available for Migration Toolkit for Runtimes 1 on RHEL 8Red Hat Product Security has rated this update ...
Synopsis Moderate: OpenShift Jenkins image and Jenkins agent base image security update Type/Severity Security Advisory: Moderate Topic Release of Bug Advisories for the OpenShift Jenkins image and Jenkins agent base imageRed Hat Product Security has rated this update as having a security impactof Moderate A Common Vulnerability Scoring Sys ...
An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of ex ...