It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_name": "libice-dev", "binary_version": "2:1.0.9-1ubuntu0.16.04.1+esm1" }, { "binary_name": "libice-dev-dbgsym", "binary_version": "2:1.0.9-1ubuntu0.16.04.1+esm1" }, { "binary_name": "libice-doc", "binary_version": "2:1.0.9-1ubuntu0.16.04.1+esm1" }, { "binary_name": "libice6", "binary_version": "2:1.0.9-1ubuntu0.16.04.1+esm1" }, { "binary_name": "libice6-dbg", "binary_version": "2:1.0.9-1ubuntu0.16.04.1+esm1" }, { "binary_name": "libice6-dbgsym", "binary_version": "2:1.0.9-1ubuntu0.16.04.1+esm1" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_name": "libice-dev", "binary_version": "2:1.0.9-2ubuntu0.18.04.1" }, { "binary_name": "libice-doc", "binary_version": "2:1.0.9-2ubuntu0.18.04.1" }, { "binary_name": "libice6", "binary_version": "2:1.0.9-2ubuntu0.18.04.1" }, { "binary_name": "libice6-dbg", "binary_version": "2:1.0.9-2ubuntu0.18.04.1" } ] }