{"id":"JLSEC-2026-97","details":"An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.","modified":"2026-04-14T13:00:08.794845Z","published":"2026-04-14T12:58:25.609Z","upstream":["CVE-2021-3782"],"database_specific":{"license":"CC-BY-4.0","sources":[{"imported":"2026-04-14T04:05:28.256Z","published":"2022-09-23T16:15:10.143Z","url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2021-3782","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3782","modified":"2025-05-22T19:15:27.303Z","id":"CVE-2021-3782"}]},"references":[{"type":"WEB","url":"https://gitlab.freedesktop.org/wayland/wayland/-/issues/224"},{"type":"WEB","url":"https://gitlab.freedesktop.org/wayland/wayland/-/issues/224"}],"affected":[{"package":{"name":"Wayland_jll","ecosystem":"Julia","purl":"pkg:julia/Wayland_jll?uuid=a2964d1f-97da-50d4-b82a-358c7fce9d89"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.21.0+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-97.json"}}],"schema_version":"1.7.5"}