Ruby before 1.8.7-p352 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900. NOTE: this issue exists because of a regression during Ruby 1.8.6 development.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ruby | Ruby-lang | 1.8.7-302 | 1.8.7-302 |
Ruby | Ruby-lang | 1.8.7-249 | 1.8.7-249 |
Ruby | Ruby-lang | 1.8.7-299 | 1.8.7-299 |
Ruby | Ruby-lang | * | 1.8.7-334 |
Ruby | Ruby-lang | 1.8.7 | 1.8.7 |
Ruby | Ruby-lang | 1.8.7 | 1.8.7 |
Ruby | Ruby-lang | 1.8.7-330 | 1.8.7-330 |
Ruby | Ruby-lang | 1.8.7-160 | 1.8.7-160 |
Ruby | Ruby-lang | 1.8.7-173 | 1.8.7-173 |
Ruby | Ruby-lang | 1.8.7-p21 | 1.8.7-p21 |
Ruby | Ruby-lang | 1.8.7 | 1.8.7 |
Ruby | Ruby-lang | 1.8.7-248 | 1.8.7-248 |
Ruby1.8 | Ubuntu | hardy | * |
Ruby1.8 | Ubuntu | lucid | * |
Ruby1.8 | Ubuntu | maverick | * |
Ruby1.8 | Ubuntu | natty | * |
Ruby1.8 | Ubuntu | upstream | * |