First published: Fri Aug 05 2011(Updated: )
The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby | <=1.8.7-334 | |
Ruby | =1.8.7-p22 | |
Ruby | =1.8.7-p71 | |
Ruby | =1.8.7-p72 | |
Ruby | =1.8.7-160 | |
Ruby | =1.8.7-173 | |
Ruby | =1.8.7-248 | |
Ruby | =1.8.7-249 | |
Ruby | =1.8.7-299 | |
Ruby | =1.8.7-302 | |
Ruby | =1.8.7-330 | |
Ruby | =1.8.7-p21 | |
Ruby | =1.9 | |
Ruby | =1.9-r18423 | |
Ruby | =1.9.0 | |
Ruby | =1.9.0-r18423 | |
Ruby | =1.9.0-0 | |
Ruby | =1.9.0-1 | |
Ruby | =1.9.0-2 | |
Ruby | =1.9.0-20060415 | |
Ruby | =1.9.0-20070709 | |
Ruby | =1.9.1 | |
Ruby | =1.9.1--p0 | |
Ruby | =1.9.1--p129 | |
Ruby | =1.9.1--p243 | |
Ruby | =1.9.1--p376 | |
Ruby | =1.9.1--p429 | |
Ruby | =1.9.1--preview_1 | |
Ruby | =1.9.1--preview_2 | |
Ruby | =1.9.1--rc1 | |
Ruby | =1.9.1--rc2 | |
Ruby | =1.9.2 | |
Ruby | =1.9.2-dev | |
Ruby | =1.9.2-p136 | |
Ruby | =1.9.2-p180 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2705 is considered to have moderate severity due to its impact on the predictability of random number generation in Ruby.
To fix CVE-2011-2705, upgrade to Ruby version 1.8.7-p352 or later, or 1.9.2-p290 or later.
CVE-2011-2705 affects Ruby versions before 1.8.7-p352 and all 1.9.x versions prior to 1.9.2-p290.
CVE-2011-2705 is a vulnerability related to insufficient randomness in cryptographic functions.
Context-dependent attackers who can predict random strings generated by vulnerable Ruby versions can be affected by CVE-2011-2705.