CVE-2017-2626

NameCVE-2017-2626
DescriptionIt was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitylow (attack range: local)
Debian Bugs856400

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libice (PTS)jessie2:1.0.9-1vulnerable
bullseye, sid, buster, stretch2:1.0.9-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libicesource(unstable)2:1.0.9-2low856400

Notes

[jessie] - libice <no-dsa> (Minor issue, can be fixed in a point update or next DSA)
[wheezy] - libice <no-dsa> (Minor issue, can be fixed in a point update or next DSA)
https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/

Search for package or bug name: Reporting problems