It was discovered that libx11 incorrectly validated certain parameter lengths. A remote attacker could possibly use this issue to trick libx11 into emitting extra X protocol requests.
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "2:1.6.4-3ubuntu0.4",
"binary_name": "libx11-6"
},
{
"binary_version": "2:1.6.4-3ubuntu0.4",
"binary_name": "libx11-data"
},
{
"binary_version": "2:1.6.4-3ubuntu0.4",
"binary_name": "libx11-dev"
},
{
"binary_version": "2:1.6.4-3ubuntu0.4",
"binary_name": "libx11-xcb-dev"
},
{
"binary_version": "2:1.6.4-3ubuntu0.4",
"binary_name": "libx11-xcb1"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "2:1.6.9-2ubuntu1.2",
"binary_name": "libx11-6"
},
{
"binary_version": "2:1.6.9-2ubuntu1.2",
"binary_name": "libx11-data"
},
{
"binary_version": "2:1.6.9-2ubuntu1.2",
"binary_name": "libx11-dev"
},
{
"binary_version": "2:1.6.9-2ubuntu1.2",
"binary_name": "libx11-xcb-dev"
},
{
"binary_version": "2:1.6.9-2ubuntu1.2",
"binary_name": "libx11-xcb1"
}
]
}