Ruby before 1.8.6-p114 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://redmine.ruby-lang.org/issues/show/4338 - | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0070.html - | |
References | () http://www.openwall.com/lists/oss-security/2011/07/20/1 - Patch | |
References | () http://www.redhat.com/support/errata/RHSA-2011-1581.html - | |
References | () http://www.securityfocus.com/bid/49126 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/69157 - |
Information
Published : 2011-08-05 22:55
Updated : 2024-11-21 01:29
NVD link : CVE-2011-3009
Mitre link : CVE-2011-3009
CVE.ORG link : CVE-2011-3009
JSON object : View
Products Affected
ruby-lang
- ruby
CWE
CWE-310
Cryptographic Issues