Ruby before 1.8.6-p114 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900.
                
            References
                    Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    21 Nov 2024, 01:29
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://redmine.ruby-lang.org/issues/show/4338 - | |
| References | () http://rhn.redhat.com/errata/RHSA-2012-0070.html - | |
| References | () http://www.openwall.com/lists/oss-security/2011/07/20/1 - Patch | |
| References | () http://www.redhat.com/support/errata/RHSA-2011-1581.html - | |
| References | () http://www.securityfocus.com/bid/49126 - | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/69157 - | 
Information
                Published : 2011-08-05 22:55
Updated : 2025-04-11 00:51
NVD link : CVE-2011-3009
Mitre link : CVE-2011-3009
CVE.ORG link : CVE-2011-3009
JSON object : View
Products Affected
                ruby-lang
- ruby
 
CWE
                
                    
                        
                        CWE-310
                        
            Cryptographic Issues
