Lucene search

K
ubuntuUbuntuUSN-5614-2
HistoryOct 03, 2022 - 12:00 a.m.

Wayland vulnerability

2022-10-0300:00:00
ubuntu.com
34
wayland
ubuntu 16.04 esm
denial of service
execute arbitrary code

CVSS3

6.6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H

AI Score

7.4

Confidence

High

EPSS

0

Percentile

12.8%

Releases

  • Ubuntu 16.04 ESM

Packages

  • wayland - Wayland compositor infrastructure

Details

USN-5614-1 fixed a vulnerability in Wayland. This update
provides the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that Wayland incorrectly handled reference counting
certain objects. An attacker could use this issue to cause Wayland to
crash, resulting in a denial of service, or possibly execute arbitrary
code.

OSVersionArchitecturePackageVersionFilename
Ubuntu16.04noarchlibwayland-bin< 1.12.0-1~ubuntu16.04.3+esm1UNKNOWN
Ubuntu16.04noarchlibwayland-bin< 1.12.0-1~ubuntu16.04.3UNKNOWN
Ubuntu16.04noarchlibwayland-bin-dbgsym< 1.12.0-1~ubuntu16.04.3UNKNOWN
Ubuntu16.04noarchlibwayland-client0< 1.12.0-1~ubuntu16.04.3UNKNOWN
Ubuntu16.04noarchlibwayland-client0-dbgsym< 1.12.0-1~ubuntu16.04.3UNKNOWN
Ubuntu16.04noarchlibwayland-cursor0< 1.12.0-1~ubuntu16.04.3UNKNOWN
Ubuntu16.04noarchlibwayland-cursor0-dbgsym< 1.12.0-1~ubuntu16.04.3UNKNOWN
Ubuntu16.04noarchlibwayland-dev< 1.12.0-1~ubuntu16.04.3UNKNOWN
Ubuntu16.04noarchlibwayland-doc< 1.12.0-1~ubuntu16.04.3UNKNOWN
Ubuntu16.04noarchlibwayland-server0< 1.12.0-1~ubuntu16.04.3UNKNOWN
Rows per page:
1-10 of 141

CVSS3

6.6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H

AI Score

7.4

Confidence

High

EPSS

0

Percentile

12.8%