It was discovered that libx11 incorrectly validated certain parameter lengths. A remote attacker could possibly use this issue to trick libx11 into emitting extra X protocol requests.
{
"binaries": [
{
"binary_name": "libx11-6",
"binary_version": "2:1.6.4-3ubuntu0.4"
},
{
"binary_name": "libx11-data",
"binary_version": "2:1.6.4-3ubuntu0.4"
},
{
"binary_name": "libx11-dev",
"binary_version": "2:1.6.4-3ubuntu0.4"
},
{
"binary_name": "libx11-xcb-dev",
"binary_version": "2:1.6.4-3ubuntu0.4"
},
{
"binary_name": "libx11-xcb1",
"binary_version": "2:1.6.4-3ubuntu0.4"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_name": "libx11-6",
"binary_version": "2:1.6.9-2ubuntu1.2"
},
{
"binary_name": "libx11-data",
"binary_version": "2:1.6.9-2ubuntu1.2"
},
{
"binary_name": "libx11-dev",
"binary_version": "2:1.6.9-2ubuntu1.2"
},
{
"binary_name": "libx11-xcb-dev",
"binary_version": "2:1.6.9-2ubuntu1.2"
},
{
"binary_name": "libx11-xcb1",
"binary_version": "2:1.6.9-2ubuntu1.2"
}
],
"availability": "No subscription required"
}