It was discovered that libx11 incorrectly validated certain parameter lengths. A remote attacker could possibly use this issue to trick libx11 into emitting extra X protocol requests.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libx11-6", "binary_version": "2:1.6.4-3ubuntu0.4" }, { "binary_name": "libx11-6-dbgsym", "binary_version": "2:1.6.4-3ubuntu0.4" }, { "binary_name": "libx11-6-udeb", "binary_version": "2:1.6.4-3ubuntu0.4" }, { "binary_name": "libx11-data", "binary_version": "2:1.6.4-3ubuntu0.4" }, { "binary_name": "libx11-dev", "binary_version": "2:1.6.4-3ubuntu0.4" }, { "binary_name": "libx11-doc", "binary_version": "2:1.6.4-3ubuntu0.4" }, { "binary_name": "libx11-xcb-dev", "binary_version": "2:1.6.4-3ubuntu0.4" }, { "binary_name": "libx11-xcb1", "binary_version": "2:1.6.4-3ubuntu0.4" }, { "binary_name": "libx11-xcb1-dbgsym", "binary_version": "2:1.6.4-3ubuntu0.4" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libx11-6", "binary_version": "2:1.6.9-2ubuntu1.2" }, { "binary_name": "libx11-6-dbgsym", "binary_version": "2:1.6.9-2ubuntu1.2" }, { "binary_name": "libx11-6-udeb", "binary_version": "2:1.6.9-2ubuntu1.2" }, { "binary_name": "libx11-data", "binary_version": "2:1.6.9-2ubuntu1.2" }, { "binary_name": "libx11-dev", "binary_version": "2:1.6.9-2ubuntu1.2" }, { "binary_name": "libx11-doc", "binary_version": "2:1.6.9-2ubuntu1.2" }, { "binary_name": "libx11-xcb-dev", "binary_version": "2:1.6.9-2ubuntu1.2" }, { "binary_name": "libx11-xcb1", "binary_version": "2:1.6.9-2ubuntu1.2" }, { "binary_name": "libx11-xcb1-dbgsym", "binary_version": "2:1.6.9-2ubuntu1.2" } ] }