CVE-2011-2686

Ruby before 1.8.7-p352 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900.  NOTE: this issue exists because of a regression during Ruby 1.8.6 development.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:N/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 81%
VendorProductVersion
ruby-langruby
𝑥
≤ 1.8.7-334
ruby-langruby
1.8.7:p22
ruby-langruby
1.8.7:p71
ruby-langruby
1.8.7:p72
ruby-langruby
1.8.7-160
ruby-langruby
1.8.7-173
ruby-langruby
1.8.7-248
ruby-langruby
1.8.7-249
ruby-langruby
1.8.7-299
ruby-langruby
1.8.7-302
ruby-langruby
1.8.7-330
ruby-langruby
1.8.7-p21
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ruby1.8
oneiric
not-affected
natty
Fixed 1.8.7.302-2ubuntu0.1
released
maverick
Fixed 1.8.7.299-2ubuntu0.1
released
lucid
Fixed 1.8.7.249-2ubuntu0.1
released
hardy
ignored
Common Weakness Enumeration
References