CVE-2020-10933

An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size, buffer, exception: false), the method resizes the buffer to fit the requested size, but no data is copied. Thus, the buffer string provides the previous value of the heap. This may expose possibly sensitive data from the interpreter.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.7.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:56

Type Values Removed Values Added
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4TNVTT66VPRMX5UZYSDGSVRXKKDDDU5/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4TNVTT66VPRMX5UZYSDGSVRXKKDDDU5/ -
References () https://security.netapp.com/advisory/ntap-20200625-0001/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20200625-0001/ - Third Party Advisory
References () https://www.debian.org/security/2020/dsa-4721 - Third Party Advisory () https://www.debian.org/security/2020/dsa-4721 - Third Party Advisory
References () https://www.ruby-lang.org/en/news/2020/03/31/heap-exposure-in-socket-cve-2020-10933/ - Exploit, Vendor Advisory () https://www.ruby-lang.org/en/news/2020/03/31/heap-exposure-in-socket-cve-2020-10933/ - Exploit, Vendor Advisory

03 May 2022, 14:21

Type Values Removed Values Added
CWE CWE-200 CWE-908
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
References (DEBIAN) https://www.debian.org/security/2020/dsa-4721 - (DEBIAN) https://www.debian.org/security/2020/dsa-4721 - Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20200625-0001/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20200625-0001/ - Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F4TNVTT66VPRMX5UZYSDGSVRXKKDDDU5/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F4TNVTT66VPRMX5UZYSDGSVRXKKDDDU5/ - Mailing List, Third Party Advisory

Information

Published : 2020-05-04 15:15

Updated : 2024-11-21 04:56


NVD link : CVE-2020-10933

Mitre link : CVE-2020-10933

CVE.ORG link : CVE-2020-10933


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux

ruby-lang

  • ruby

fedoraproject

  • fedora
CWE
CWE-908

Use of Uninitialized Resource