Description
The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-88-1 | ruby1.8 security update |
Debian DLA |
DLA-235-1 | ruby1.9.1 security update |
EUVD |
EUVD-2011-2686 | The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID. |
Ubuntu USN |
USN-1377-1 | Ruby vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T23:08:23.972Z
Reserved: 2011-07-11T00:00:00.000Z
Link: CVE-2011-2705
No data.
Status : Deferred
Published: 2011-08-05T21:55:04.530
Modified: 2025-04-11T00:51:21.963
Link: CVE-2011-2705
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN