Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
- Ubuntu Security Notice USN-5614-2[6]
- Authored by Ubuntu[7] | Site security.ubuntu.com[8]
-
Ubuntu Security Notice 5614-2 - USN-5614-1 fixed a vulnerability in Wayland. This update provides the corresponding update for Ubuntu 16.04 ESM. It was discovered that Wayland incorrectly handled reference counting certain objects. An attacker could use this issue to cause Wayland to crash, resulting in a denial of service, or possibly execute arbitrary code.
- systems | linux[9], ubuntu[10]
- advisories | CVE-2021-3782[11]
- SHA-256 |
10e730b3dc2565c7df75f5b8c7912171f93bac717141d6b3dac8f64898adb02f
- Download[12] | Favorite[13] | View[14]
Change Mirror[15] Download[16]
==========================================================================
Ubuntu Security Notice USN-5614-2
October 03, 2022
wayland vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 ESM
Summary:
Wayland could be made to crash or run programs.
Software Description:
- wayland: Wayland compositor infrastructure
Details:
USN-5614-1 fixed a vulnerability in Wayland. This update
provides the corresponding update for Ubuntu 16.04 ESM.
Original advisory details:
It was discovered that Wayland incorrectly handled reference counting
certain objects. An attacker could use this issue to cause Wayland to
crash, resulting in a denial of service, or possibly execute arbitrary
code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 ESM:
libwayland-bin 1.12.0-1~ubuntu16.04.3+esm1
libwayland-client0 1.12.0-1~ubuntu16.04.3+esm1
libwayland-cursor0 1.12.0-1~ubuntu16.04.3+esm1
libwayland-server0 1.12.0-1~ubuntu16.04.3+esm1
After a standard system update you need to reboot your computer to make all
the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5614-2
https://ubuntu.com/security/notices/USN-5614-1
CVE-2021-3782
File Tags
- ActiveX[21] (932)
- Advisory[22] (78,310)
- Arbitrary[23] (15,293)
- BBS[24] (2,859)
- Bypass[25] (1,599)
- CGI[26] (1,013)
- Code Execution[27] (6,783)
- Conference[28] (671)
- Cracker[29] (799)
- CSRF[30] (3,277)
- DoS[31] (22,077)
- Encryption[32] (2,341)
- Exploit[33] (50,166)
- File Inclusion[34] (4,160)
- File Upload[35] (945)
- Firewall[36] (821)
- Info Disclosure[37] (2,565)
- Intrusion Detection[38] (862)
- Java[39] (2,825)
- JavaScript[40] (808)
- Kernel[41] (6,163)
- Local[42] (14,100)
- Magazine[43] (586)
- Overflow[44] (12,254)
- Perl[45] (1,413)
- PHP[46] (5,059)
- Proof of Concept[47] (2,284)
- Protocol[48] (3,359)
- Python[49] (1,409)
- Remote[50] (29,882)
- Root[51] (3,468)
- Ruby[52] (581)
- Scanner[53] (1,631)
- Security Tool[54] (7,743)
- Shell[55] (3,079)
- Shellcode[56] (1,204)
- Sniffer[57] (883)
- Spoof[58] (2,123)
- SQL Injection[59] (16,066)
- TCP[60] (2,370)
- Trojan[61] (682)
- UDP[62] (873)
- Virus[63] (660)
- Vulnerability[64] (30,671)
- Web[65] (9,115)
- Whitepaper[66] (3,723)
- x86[67] (944)
- XSS[68] (17,413)
- Other[69]
File Archives
- October 2022[70]
- September 2022[71]
- August 2022[72]
- July 2022[73]
- June 2022[74]
- May 2022[75]
- April 2022[76]
- March 2022[77]
- February 2022[78]
- January 2022[79]
- December 2021[80]
- November 2021[81]
- Older[82]
Systems
- AIX[83] (426)
- Apple[84] (1,899)
- BSD[85] (369)
- CentOS[86] (55)
- Cisco[87] (1,915)
- Debian[88] (5,948)
- Fedora[89] (1,690)
- FreeBSD[90] (1,242)
- Gentoo[91] (4,219)
- HPUX[92] (878)
- iOS[93] (323)
- iPhone[94] (108)
- IRIX[95] (220)
- Juniper[96] (67)
- Linux[97] (42,959)
- Mac OS X[98] (684)
- Mandriva[99] (3,105)
- NetBSD[100] (255)
- OpenBSD[101] (479)
- RedHat[102] (12,018)
- Slackware[103] (941)
- Solaris[104] (1,607)
- SUSE[105] (1,444)
- Ubuntu[106] (8,039)
- UNIX[107] (9,121)
- UnixWare[108] (185)
- Windows[109] (6,476)
- Other[110]
Read more https://packetstormsecurity.com/files/168617/USN-5614-2.txt