Описание
It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | not-affected | 2:1.0.9-2 |
| bionic | released | 2:1.0.9-2ubuntu0.18.04.1 |
| cosmic | not-affected | 2:1.0.9-2 |
| devel | not-affected | 2:1.0.9-2 |
| disco | not-affected | 2:1.0.9-2 |
| eoan | not-affected | 2:1.0.9-2 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needed] |
| esm-infra/bionic | released | 2:1.0.9-2ubuntu0.18.04.1 |
| esm-infra/focal | not-affected | 2:1.0.9-2 |
| esm-infra/xenial | released | 2:1.0.9-1ubuntu0.16.04.1+esm1 |
Показывать по
Ссылки на источники
EPSS
2.1 Low
CVSS2
5.2 Medium
CVSS3
Связанные уязвимости
It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.
It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.
It was discovered that libICE before 1.0.9-8 used a weak entropy to ge ...
EPSS
2.1 Low
CVSS2
5.2 Medium
CVSS3