CVE-2011-2705
05.08.2011, 21:55
The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.Enginsight
Vendor | Product | Version |
---|---|---|
ruby-lang | ruby | 𝑥 ≤ 1.8.7-334 |
ruby-lang | ruby | 1.8.7:p22 |
ruby-lang | ruby | 1.8.7:p71 |
ruby-lang | ruby | 1.8.7:p72 |
ruby-lang | ruby | 1.8.7-160 |
ruby-lang | ruby | 1.8.7-173 |
ruby-lang | ruby | 1.8.7-248 |
ruby-lang | ruby | 1.8.7-249 |
ruby-lang | ruby | 1.8.7-299 |
ruby-lang | ruby | 1.8.7-302 |
ruby-lang | ruby | 1.8.7-330 |
ruby-lang | ruby | 1.8.7-p21 |
ruby-lang | ruby | 1.9 |
ruby-lang | ruby | 1.9:r18423 |
ruby-lang | ruby | 1.9.0 |
ruby-lang | ruby | 1.9.0:r18423 |
ruby-lang | ruby | 1.9.0-0 |
ruby-lang | ruby | 1.9.0-1 |
ruby-lang | ruby | 1.9.0-2 |
ruby-lang | ruby | 1.9.0-20060415 |
ruby-lang | ruby | 1.9.0-20070709 |
ruby-lang | ruby | 1.9.1 |
ruby-lang | ruby | 1.9.1:-p0 |
ruby-lang | ruby | 1.9.1:-p129 |
ruby-lang | ruby | 1.9.1:-p243 |
ruby-lang | ruby | 1.9.1:-p376 |
ruby-lang | ruby | 1.9.1:-p429 |
ruby-lang | ruby | 1.9.1:-preview_1 |
ruby-lang | ruby | 1.9.1:-preview_2 |
ruby-lang | ruby | 1.9.1:-rc1 |
ruby-lang | ruby | 1.9.1:-rc2 |
ruby-lang | ruby | 1.9.2 |
ruby-lang | ruby | 1.9.2:dev |
ruby-lang | ruby | 1.9.2-p136 |
ruby-lang | ruby | 1.9.2-p180 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
ruby1.8 |
| ||||||||||||||||||
ruby1.9 |
| ||||||||||||||||||
ruby1.9.1 |
|
Common Weakness Enumeration
References