Sha256: 6b266c8259e97248c82ed41eb97819d42b224712f37f48a8f17de078d72f00ad

Contents?: true

Size: 662 Bytes

Versions: 6

Compression:

Stored size: 662 Bytes

Contents

---
engine: ruby
cve: 2011-2686
url: https://osdir.com/ml/lang-ruby-core/2011-01/msg00917.html
title: Ruby Random Number Generation Local Denial Of Service Vulnerability
date: 2011-07-02
description: |
  Ruby before 1.8.7-p352 does not reset the random seed upon forking, which
  makes it easier for context-dependent attackers to predict the values of
  random numbers by leveraging knowledge of the number sequence obtained in a
  different child process, a related issue to CVE-2003-0900. NOTE: this issue
  exists because of a regression during Ruby 1.8.6 development.
cvss_v2: 5.0
unaffected_versions:
  - "< 1.8.6.399"
patched_versions:
  - ">= 1.8.7.352"

Version data entries

6 entries across 6 versions & 2 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/rubies/ruby/CVE-2011-2686.yml
bundler-budit-0.6.2 data/ruby-advisory-db/rubies/ruby/CVE-2011-2686.yml
bundler-budit-0.6.1 data/ruby-advisory-db/rubies/ruby/CVE-2011-2686.yml
bundler-audit-0.6.1 data/ruby-advisory-db/rubies/ruby/CVE-2011-2686.yml
bundler-audit-0.6.0 data/ruby-advisory-db/rubies/ruby/CVE-2011-2686.yml
bundler-audit-0.5.0 data/ruby-advisory-db/rubies/ruby/CVE-2011-2686.yml