In libxslt 1.1.29 and earlier, the EXSLT math.random function was not initialized with a random seed during startup, which could cause usage of this function to produce predictable outputs.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
artful libxslt None
devel libxslt None
precise/esm libxslt None
trusty libxslt None
upstream libxslt None
xenial libxslt None


Release Package Reason
precise libxslt ignored
vivid/stable-phone-overlay libxslt DNE
vivid/ubuntu-core libxslt DNE
yakkety libxslt ignored
zesty libxslt ignored