It was discovered that libx11 incorrectly validated certain parameter lengths. A remote attacker could possibly use this issue to trick libx11 into emitting extra X protocol requests.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2:1.6.4-3ubuntu0.4", "binary_name": "libx11-6" }, { "binary_version": "2:1.6.4-3ubuntu0.4", "binary_name": "libx11-6-dbgsym" }, { "binary_version": "2:1.6.4-3ubuntu0.4", "binary_name": "libx11-6-udeb" }, { "binary_version": "2:1.6.4-3ubuntu0.4", "binary_name": "libx11-data" }, { "binary_version": "2:1.6.4-3ubuntu0.4", "binary_name": "libx11-dev" }, { "binary_version": "2:1.6.4-3ubuntu0.4", "binary_name": "libx11-doc" }, { "binary_version": "2:1.6.4-3ubuntu0.4", "binary_name": "libx11-xcb-dev" }, { "binary_version": "2:1.6.4-3ubuntu0.4", "binary_name": "libx11-xcb1" }, { "binary_version": "2:1.6.4-3ubuntu0.4", "binary_name": "libx11-xcb1-dbgsym" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2:1.6.9-2ubuntu1.2", "binary_name": "libx11-6" }, { "binary_version": "2:1.6.9-2ubuntu1.2", "binary_name": "libx11-6-dbgsym" }, { "binary_version": "2:1.6.9-2ubuntu1.2", "binary_name": "libx11-6-udeb" }, { "binary_version": "2:1.6.9-2ubuntu1.2", "binary_name": "libx11-data" }, { "binary_version": "2:1.6.9-2ubuntu1.2", "binary_name": "libx11-dev" }, { "binary_version": "2:1.6.9-2ubuntu1.2", "binary_name": "libx11-doc" }, { "binary_version": "2:1.6.9-2ubuntu1.2", "binary_name": "libx11-xcb-dev" }, { "binary_version": "2:1.6.9-2ubuntu1.2", "binary_name": "libx11-xcb1" }, { "binary_version": "2:1.6.9-2ubuntu1.2", "binary_name": "libx11-xcb1-dbgsym" } ] }