Lucene search

K
ubuntuUbuntuUSN-5614-2
HistoryOct 03, 2022 - 12:00 a.m.

Wayland vulnerability

2022-10-0300:00:00
ubuntu.com
24

6.6 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H

7.4 High

AI Score

Confidence

High

4.3 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:P/I:P/A:P

0.0004 Low

EPSS

Percentile

12.1%

Releases

  • Ubuntu 16.04 ESM

Packages

  • wayland - Wayland compositor infrastructure

Details

USN-5614-1 fixed a vulnerability in Wayland. This update
provides the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that Wayland incorrectly handled reference counting
certain objects. An attacker could use this issue to cause Wayland to
crash, resulting in a denial of service, or possibly execute arbitrary
code.

OSVersionArchitecturePackageVersionFilename
Ubuntu16.04noarchlibwayland-bin< 1.12.0-1~ubuntu16.04.3+esm1UNKNOWN
Ubuntu16.04noarchlibwayland-bin< 1.12.0-1~ubuntu16.04.3UNKNOWN
Ubuntu16.04noarchlibwayland-bin-dbgsym< 1.12.0-1~ubuntu16.04.3UNKNOWN
Ubuntu16.04noarchlibwayland-client0< 1.12.0-1~ubuntu16.04.3UNKNOWN
Ubuntu16.04noarchlibwayland-client0-dbgsym< 1.12.0-1~ubuntu16.04.3UNKNOWN
Ubuntu16.04noarchlibwayland-cursor0< 1.12.0-1~ubuntu16.04.3UNKNOWN
Ubuntu16.04noarchlibwayland-cursor0-dbgsym< 1.12.0-1~ubuntu16.04.3UNKNOWN
Ubuntu16.04noarchlibwayland-dev< 1.12.0-1~ubuntu16.04.3UNKNOWN
Ubuntu16.04noarchlibwayland-doc< 1.12.0-1~ubuntu16.04.3UNKNOWN
Ubuntu16.04noarchlibwayland-server0< 1.12.0-1~ubuntu16.04.3UNKNOWN
Rows per page:
1-10 of 141

6.6 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H

7.4 High

AI Score

Confidence

High

4.3 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:P/I:P/A:P

0.0004 Low

EPSS

Percentile

12.1%