USN-5614-2: Wayland vulnerability
3 October 2022
Wayland could be made to crash or run programs.
Releases
Packages
- wayland - Wayland compositor infrastructure
Details
USN-5614-1 fixed a vulnerability in Wayland. This update
provides the corresponding update for Ubuntu 16.04 ESM.
Original advisory details:
It was discovered that Wayland incorrectly handled reference counting
certain objects. An attacker could use this issue to cause Wayland to
crash, resulting in a denial of service, or possibly execute arbitrary
code.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
libwayland-bin
-
1.12.0-1~ubuntu16.04.3+esm1
Available with Ubuntu Pro
-
libwayland-cursor0
-
1.12.0-1~ubuntu16.04.3+esm1
Available with Ubuntu Pro
-
libwayland-server0
-
1.12.0-1~ubuntu16.04.3+esm1
Available with Ubuntu Pro
-
libwayland-client0
-
1.12.0-1~ubuntu16.04.3+esm1
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make all
the necessary changes.
References
Related notices
- USN-5614-1: libwayland-bin, libwayland-server0, libwayland-egl1, wayland, libwayland-dev, libwayland-cursor0, libwayland-client0, libwayland-egl-backend-dev, libwayland-doc