It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.
{ "binaries": [ { "binary_version": "2:1.0.9-1ubuntu0.16.04.1+esm1", "binary_name": "libice-dev" }, { "binary_version": "2:1.0.9-1ubuntu0.16.04.1+esm1", "binary_name": "libice6" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-2626.json"
{ "binaries": [ { "binary_version": "2:1.0.9-2ubuntu0.18.04.1", "binary_name": "libice-dev" }, { "binary_version": "2:1.0.9-2ubuntu0.18.04.1", "binary_name": "libice6" } ], "availability": "No subscription required" }