CVE-2011-2686
Published: 5 August 2011
Ruby before 1.8.7-p352 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900. NOTE: this issue exists because of a regression during Ruby 1.8.6 development.
Notes
Author | Note |
---|---|
jdstrand | ruby1.8 only |
tyhicks | Simple test case in upstream bug's description |
Priority
Status
Package | Release | Status |
---|---|---|
ruby1.8 Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Released
(1.8.7.249-2ubuntu0.1)
|
|
maverick |
Released
(1.8.7.299-2ubuntu0.1)
|
|
natty |
Released
(1.8.7.302-2ubuntu0.1)
|
|
oneiric |
Not vulnerable
(1.8.7.352-2)
|
|
upstream |
Released
(1.8.7.352-2)
|
|
Patches: upstream: http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=31713 |