CVE Vulnerabilities

CVE-2020-10933

Use of Uninitialized Resource

Published: May 04, 2020 | Modified: Nov 21, 2024
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
5.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size, buffer, exception: false), the method resizes the buffer to fit the requested size, but no data is copied. Thus, the buffer string provides the previous value of the heap. This may expose possibly sensitive data from the interpreter.

Weakness

The product uses or accesses a resource that has not been initialized.

Affected Software

NameVendorStart VersionEnd Version
RubyRuby-lang2.5.0 (including)2.5.7 (including)
RubyRuby-lang2.6.0 (including)2.6.5 (including)
RubyRuby-lang2.7.0 (including)2.7.0 (including)
Red Hat Enterprise Linux 8RedHatruby:2.5-8040020200923213910.522a0ee4*
Red Hat Enterprise Linux 8RedHatruby:2.6-8040020210430142949.522a0ee4*
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionsRedHatruby:2.6-8010020220201152941.c27ad7f8*
Red Hat Enterprise Linux 8.2 Extended Update SupportRedHatruby:2.6-8020020220201131207.4cda2c84*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-ruby25-ruby-0:2.5.9-9.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-ruby26-ruby-0:2.6.7-119.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUSRedHatrh-ruby25-ruby-0:2.5.9-9.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUSRedHatrh-ruby25-ruby-0:2.5.9-9.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUSRedHatrh-ruby26-ruby-0:2.6.7-119.el7*
Ruby1.9.1Ubuntutrusty*
Ruby2.0Ubuntutrusty*
Ruby2.5Ubuntubionic*
Ruby2.5Ubuntueoan*
Ruby2.5Ubuntuesm-infra/bionic*
Ruby2.7Ubuntuesm-infra/focal*
Ruby2.7Ubuntufocal*
Ruby2.7Ubuntuupstream*

Potential Mitigations

References