Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-10933

Опубликовано: 31 мар. 2020
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size, buffer, exception: false), the method resizes the buffer to fit the requested size, but no data is copied. Thus, the buffer string provides the previous value of the heap. This may expose possibly sensitive data from the interpreter.

Отчет

Red Hat CloudForms 5 has stopped shipping Ruby and 4.7 ships Ruby 2.4 series, hence not vulnerable to the flaw. Red Hat Enterprise Linux versions prior than 8 ships ruby 2.0 or older releases, hence not vulnerable to the flaw.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5rubyNot affected
Red Hat Enterprise Linux 5rubyNot affected
Red Hat Enterprise Linux 6rubyNot affected
Red Hat Enterprise Linux 7rubyNot affected
Red Hat Enterprise Linux 8rubyFixedRHSA-2021:258729.06.2021
Red Hat Enterprise Linux 8rubyFixedRHSA-2021:258829.06.2021
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionsrubyFixedRHSA-2022:058121.02.2022
Red Hat Enterprise Linux 8.2 Extended Update SupportrubyFixedRHSA-2022:058221.02.2022
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-ruby25-rubyFixedRHSA-2021:210426.05.2021
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-ruby26-rubyFixedRHSA-2021:223003.06.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-805->CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1833291ruby: BasicSocket#read_nonblock method leads to information disclosure

EPSS

Процентиль: 52%
0.00288
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 5 лет назад

An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size, buffer, exception: false), the method resizes the buffer to fit the requested size, but no data is copied. Thus, the buffer string provides the previous value of the heap. This may expose possibly sensitive data from the interpreter.

CVSS3: 5.3
nvd
больше 5 лет назад

An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size, buffer, exception: false), the method resizes the buffer to fit the requested size, but no data is copied. Thus, the buffer string provides the previous value of the heap. This may expose possibly sensitive data from the interpreter.

CVSS3: 5.3
msrc
почти 5 лет назад

Описание отсутствует

CVSS3: 5.3
debian
больше 5 лет назад

An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6 ...

CVSS3: 5.3
github
больше 3 лет назад

An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size, buffer, exception: false), the method resizes the buffer to fit the requested size, but no data is copied. Thus, the buffer string provides the previous value of the heap. This may expose possibly sensitive data from the interpreter.

EPSS

Процентиль: 52%
0.00288
Низкий

5.3 Medium

CVSS3