Ruby prior to 1.8.7-p352 does not reset the random seed upon forking, which makes it easier for context-dependent malicious users to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900. NOTE: this issue exists because of a regression during Ruby 1.8.6 development.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
ruby-lang ruby 1.8.7-302 |
||
ruby-lang ruby 1.8.7-249 |
||
ruby-lang ruby 1.8.7-299 |
||
ruby-lang ruby |
||
ruby-lang ruby 1.8.7 |
||
ruby-lang ruby 1.8.7-330 |
||
ruby-lang ruby 1.8.7-160 |
||
ruby-lang ruby 1.8.7-173 |
||
ruby-lang ruby 1.8.7-p21 |
||
ruby-lang ruby 1.8.7-248 |