Описание
An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size, buffer, exception: false), the method resizes the buffer to fit the requested size, but no data is copied. Thus, the buffer string provides the previous value of the heap. This may expose possibly sensitive data from the interpreter.
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | DNE | |
eoan | DNE | |
esm-infra-legacy/trusty | DNE | |
esm-infra/focal | DNE | |
focal | DNE | |
groovy | DNE | |
precise/esm | DNE | |
trusty | ignored | end of standard support |
trusty/esm | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | DNE | |
eoan | DNE | |
esm-infra-legacy/trusty | DNE | |
esm-infra/focal | DNE | |
focal | DNE | |
groovy | DNE | |
precise/esm | DNE | |
trusty | ignored | end of standard support |
trusty/esm | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | DNE | |
eoan | DNE | |
esm-infra-legacy/trusty | DNE | |
esm-infra/focal | DNE | |
esm-infra/xenial | not-affected | code not present |
focal | DNE | |
groovy | DNE | |
precise/esm | DNE | |
trusty | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 2.5.1-1ubuntu1.8 |
devel | DNE | |
eoan | ignored | end of life |
esm-infra-legacy/trusty | DNE | |
esm-infra/bionic | released | 2.5.1-1ubuntu1.8 |
esm-infra/focal | DNE | |
focal | DNE | |
groovy | DNE | |
precise/esm | DNE | |
trusty | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | not-affected | 2.7.2-4 |
eoan | DNE | |
esm-infra-legacy/trusty | DNE | |
esm-infra/focal | released | 2.7.0-5ubuntu1.3 |
focal | released | 2.7.0-5ubuntu1.3 |
groovy | not-affected | 2.7.1-3ubuntu1.1 |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE |
Показывать по
EPSS
5 Medium
CVSS2
5.3 Medium
CVSS3
Связанные уязвимости
An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size, buffer, exception: false), the method resizes the buffer to fit the requested size, but no data is copied. Thus, the buffer string provides the previous value of the heap. This may expose possibly sensitive data from the interpreter.
An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size, buffer, exception: false), the method resizes the buffer to fit the requested size, but no data is copied. Thus, the buffer string provides the previous value of the heap. This may expose possibly sensitive data from the interpreter.
An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6 ...
An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size, buffer, exception: false), the method resizes the buffer to fit the requested size, but no data is copied. Thus, the buffer string provides the previous value of the heap. This may expose possibly sensitive data from the interpreter.
EPSS
5 Medium
CVSS2
5.3 Medium
CVSS3