It was discovered that libx11 incorrectly validated certain parameter lengths. A remote attacker could possibly use this issue to trick libx11 into emitting extra X protocol requests.
{ "availability": "No subscription required", "binaries": [ { "libx11-6-udeb": "2:1.6.4-3ubuntu0.4", "libx11-6-dbgsym": "2:1.6.4-3ubuntu0.4", "libx11-dev": "2:1.6.4-3ubuntu0.4", "libx11-xcb1-dbgsym": "2:1.6.4-3ubuntu0.4", "libx11-6": "2:1.6.4-3ubuntu0.4", "libx11-xcb-dev": "2:1.6.4-3ubuntu0.4", "libx11-xcb1": "2:1.6.4-3ubuntu0.4", "libx11-doc": "2:1.6.4-3ubuntu0.4", "libx11-data": "2:1.6.4-3ubuntu0.4" } ] }
{ "availability": "No subscription required", "binaries": [ { "libx11-6-udeb": "2:1.6.9-2ubuntu1.2", "libx11-6-dbgsym": "2:1.6.9-2ubuntu1.2", "libx11-dev": "2:1.6.9-2ubuntu1.2", "libx11-xcb1-dbgsym": "2:1.6.9-2ubuntu1.2", "libx11-6": "2:1.6.9-2ubuntu1.2", "libx11-xcb-dev": "2:1.6.9-2ubuntu1.2", "libx11-xcb1": "2:1.6.9-2ubuntu1.2", "libx11-doc": "2:1.6.9-2ubuntu1.2", "libx11-data": "2:1.6.9-2ubuntu1.2" } ] }