It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "2:1.0.9-1ubuntu0.16.04.1+esm1", "binary_name": "libice-dev" }, { "binary_version": "2:1.0.9-1ubuntu0.16.04.1+esm1", "binary_name": "libice-dev-dbgsym" }, { "binary_version": "2:1.0.9-1ubuntu0.16.04.1+esm1", "binary_name": "libice-doc" }, { "binary_version": "2:1.0.9-1ubuntu0.16.04.1+esm1", "binary_name": "libice6" }, { "binary_version": "2:1.0.9-1ubuntu0.16.04.1+esm1", "binary_name": "libice6-dbg" }, { "binary_version": "2:1.0.9-1ubuntu0.16.04.1+esm1", "binary_name": "libice6-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "2:1.0.9-2ubuntu0.18.04.1", "binary_name": "libice-dev" }, { "binary_version": "2:1.0.9-2ubuntu0.18.04.1", "binary_name": "libice-doc" }, { "binary_version": "2:1.0.9-2ubuntu0.18.04.1", "binary_name": "libice6" }, { "binary_version": "2:1.0.9-2ubuntu0.18.04.1", "binary_name": "libice6-dbg" } ] }