It was discovered that libICE was using a weak mechanism to generate the session cookies. A local attacker could possibly use this issue to perform a privilege escalation attack.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_version": "2:1.0.9-1ubuntu0.16.04.1+esm1", "binary_name": "libice-dev" }, { "binary_version": "2:1.0.9-1ubuntu0.16.04.1+esm1", "binary_name": "libice-dev-dbgsym" }, { "binary_version": "2:1.0.9-1ubuntu0.16.04.1+esm1", "binary_name": "libice-doc" }, { "binary_version": "2:1.0.9-1ubuntu0.16.04.1+esm1", "binary_name": "libice6" }, { "binary_version": "2:1.0.9-1ubuntu0.16.04.1+esm1", "binary_name": "libice6-dbg" }, { "binary_version": "2:1.0.9-1ubuntu0.16.04.1+esm1", "binary_name": "libice6-dbgsym" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2:1.0.9-2ubuntu0.18.04.1", "binary_name": "libice-dev" }, { "binary_version": "2:1.0.9-2ubuntu0.18.04.1", "binary_name": "libice-doc" }, { "binary_version": "2:1.0.9-2ubuntu0.18.04.1", "binary_name": "libice6" }, { "binary_version": "2:1.0.9-2ubuntu0.18.04.1", "binary_name": "libice6-dbg" } ] }