CVE-2011-2686
05.08.2011, 21:55
Ruby before 1.8.7-p352 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900. NOTE: this issue exists because of a regression during Ruby 1.8.6 development.Enginsight
Vendor | Product | Version |
---|---|---|
ruby-lang | ruby | 𝑥 ≤ 1.8.7-334 |
ruby-lang | ruby | 1.8.7:p22 |
ruby-lang | ruby | 1.8.7:p71 |
ruby-lang | ruby | 1.8.7:p72 |
ruby-lang | ruby | 1.8.7-160 |
ruby-lang | ruby | 1.8.7-173 |
ruby-lang | ruby | 1.8.7-248 |
ruby-lang | ruby | 1.8.7-249 |
ruby-lang | ruby | 1.8.7-299 |
ruby-lang | ruby | 1.8.7-302 |
ruby-lang | ruby | 1.8.7-330 |
ruby-lang | ruby | 1.8.7-p21 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References