Total vulnerabilities in the database
It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.
Software | From | Fixed in |
---|---|---|
freedesktop / libice | - | 1.0.9.x |
redhat / enterprise_linux_desktop | 7.0 | 7.0.x |
redhat / enterprise_linux_workstation | 7.0 | 7.0.x |
redhat / enterprise_linux_server | 7.0 | 7.0.x |
redhat / enterprise_linux_server_aus | 7.4 | 7.4.x |
redhat / enterprise_linux_server_eus | 7.4 | 7.4.x |
redhat / enterprise_linux_server_eus | 7.5 | 7.5.x |