{"id":"CVE-2017-2626","details":"It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.","modified":"2026-04-16T01:41:31.986928706Z","published":"2018-07-27T19:29:00.377Z","related":["SUSE-SU-2017:1835-1","SUSE-SU-2017:1848-1","SUSE-SU-2018:0337-1","openSUSE-SU-2024:10917-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"7.4"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"7.4"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"7.5"}],"source":"CPE_FIELD"}]},"references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2019/07/14/3"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2019/11/msg00022.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/96480"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1037919"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1865"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201704-03"},{"type":"ADVISORY","url":"https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2626"},{"type":"FIX","url":"https://cgit.freedesktop.org/xorg/lib/libICE/commit/?id=ff5e59f32255913bb1cdf51441b98c9107ae165b"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.freedesktop.org/xorg/lib/libICE","events":[{"introduced":"0"},{"last_affected":"0dfab4253e26d5c6e5f058126eb5e9f7a7732ae8"},{"last_affected":"2a30ec82f3bd2aa1f2566e97fee70403a8448de8"}],"database_specific":{"cpe":["cpe:2.3:a:freedesktop:libice:*:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"],"extracted_events":[{"introduced":"0"},{"last_affected":"1.0.9"},{"last_affected":"7.0"}],"source":"CPE_FIELD"}}],"versions":["MODULAR_COPY","PRE_xf86-4_3_0_1","XACE-SELINUX-MERGE","XORG-6_7_99_1","XORG-6_7_99_2","XORG-6_7_99_901","XORG-6_7_99_902","XORG-6_7_99_903","XORG-6_7_99_904","XORG-6_8_0","XORG-6_8_1","XORG-6_8_1_901","XORG-6_8_1_902","XORG-6_8_1_903","XORG-6_8_1_904","XORG-6_8_2","XORG-6_8_99_1","XORG-6_8_99_10","XORG-6_8_99_11","XORG-6_8_99_12","XORG-6_8_99_13","XORG-6_8_99_14","XORG-6_8_99_15","XORG-6_8_99_16","XORG-6_8_99_2","XORG-6_8_99_3","XORG-6_8_99_4","XORG-6_8_99_5","XORG-6_8_99_6","XORG-6_8_99_7","XORG-6_8_99_8","XORG-6_8_99_9","XORG-6_8_99_900","XORG-6_8_99_901","XORG-6_8_99_902","XORG-6_8_99_903","XORG-6_99_99_900","XORG-6_99_99_901","XORG-6_99_99_902","XORG-6_99_99_903","XORG-6_99_99_904","XORG-7_0","XORG-7_0_99_901","XORG-7_1","XORG-MAIN","lg3d-base","lg3d-rel-0-6-2","lg3d-rel-0-7-0","libICE-1.0.2","libICE-1.0.3","libICE-1.0.4","libICE-1.0.5","libICE-1.0.6","libICE-1.0.7","libICE-1.0.8","libICE-1.0.9","libICE-1_0_1","rel-0-6-1","sco_port_update-base","xf86-012804-2330","xf86-4_3_0_1","xf86-4_3_99_16","xf86-4_3_99_901","xf86-4_3_99_902","xf86-4_3_99_903","xf86-4_3_99_903_special","xf86-4_4_0","xf86-4_4_99_1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-2626.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}