CVE-2017-2626

NameCVE-2017-2626
DescriptionIt was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2002-1
Debian Bugs856400

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libice (PTS)buster2:1.0.9-2fixed
sid, trixie, bookworm, bullseye2:1.0.10-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libicesourcejessie2:1.0.9-1+deb8u1DLA-2002-1
libicesource(unstable)2:1.0.9-2856400

Notes

[wheezy] - libice <no-dsa> (Minor issue, can be fixed in a point update or next DSA)
https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/

Search for package or bug name: Reporting problems