Files
poky/meta/recipes-graphics
Narpat Mali 305b505557 wayland: fix CVE-2021-3782
An internal reference count is held on the buffer pool,
incremented every time a new buffer is created from the pool.
The reference count is maintained as an int;
on LP64 systems this can cause thereference count to overflow if
the client creates a large number of wl_shm buffer objects,
or if it can coerce the server to create a large number of external references
to the buffer storage. With the reference count overflowing, a use-after-free
can be constructed on the wl_shm_pool tracking structure,
where values may be incremented or decremented;
it may also be possible to construct a limited oracle to leak 4 bytes of
server-side memory to the attacking client at a time.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2021-3782

Upstream patch:
b19488c715

(From OE-Core rev: 09b8ff8d2361b2db001bc963f481db294ccf2170)

Signed-off-by: Narpat Mali <narpat.mali@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2022-11-04 13:13:31 +00:00
..
2022-02-25 12:41:24 +00:00
2021-12-06 11:09:52 +00:00
2021-08-23 08:25:53 +01:00
2022-04-14 09:47:00 +01:00
2022-03-24 17:45:29 +00:00
2022-02-18 11:37:12 +00:00
2022-11-04 13:13:31 +00:00
2022-08-04 16:29:15 +01:00