CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
AI Score
Confidence
High
EPSS
Percentile
12.8%
USN-5614-1 fixed a vulnerability in Wayland. This update
provides the corresponding update for Ubuntu 16.04 ESM.
Original advisory details:
It was discovered that Wayland incorrectly handled reference counting
certain objects. An attacker could use this issue to cause Wayland to
crash, resulting in a denial of service, or possibly execute arbitrary
code.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 16.04 | noarch | libwayland-bin | < 1.12.0-1~ubuntu16.04.3+esm1 | UNKNOWN |
Ubuntu | 16.04 | noarch | libwayland-bin | < 1.12.0-1~ubuntu16.04.3 | UNKNOWN |
Ubuntu | 16.04 | noarch | libwayland-bin-dbgsym | < 1.12.0-1~ubuntu16.04.3 | UNKNOWN |
Ubuntu | 16.04 | noarch | libwayland-client0 | < 1.12.0-1~ubuntu16.04.3 | UNKNOWN |
Ubuntu | 16.04 | noarch | libwayland-client0-dbgsym | < 1.12.0-1~ubuntu16.04.3 | UNKNOWN |
Ubuntu | 16.04 | noarch | libwayland-cursor0 | < 1.12.0-1~ubuntu16.04.3 | UNKNOWN |
Ubuntu | 16.04 | noarch | libwayland-cursor0-dbgsym | < 1.12.0-1~ubuntu16.04.3 | UNKNOWN |
Ubuntu | 16.04 | noarch | libwayland-dev | < 1.12.0-1~ubuntu16.04.3 | UNKNOWN |
Ubuntu | 16.04 | noarch | libwayland-doc | < 1.12.0-1~ubuntu16.04.3 | UNKNOWN |
Ubuntu | 16.04 | noarch | libwayland-server0 | < 1.12.0-1~ubuntu16.04.3 | UNKNOWN |