CVE-2011-3009

Impact:
Low
Public Date:
2011-07-02
Bugzilla:
722415: CVE-2011-2686 CVE-2011-2705 CVE-2011-3009 ruby: Properly initialize the random number generator when forking new process

The MITRE CVE dictionary describes this issue as:

Ruby before 1.8.6-p114 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900.

Find out more about CVE-2011-3009 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw in Red Hat Enterprise Linux 4 and 5.

CVSS v2 metrics

Base Score 2.1
Base Metrics AV:L/AC:L/Au:N/C:P/I:N/A:N
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 5 (ruby) RHSA-2012:0070 2012-01-30
Red Hat Enterprise Linux 4 (ruby) RHSA-2012:0070 2012-01-30
Red Hat Enterprise Linux 6 (ruby) RHSA-2011:1581 2011-12-05
Last Modified

CVE description copyright © 2017, The MITRE Corporation