Severity
5.3MEDIUMNVD
EPSS
0.4%
top 36.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 4
Latest updateMay 24

Description

An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size, buffer, exception: false), the method resizes the buffer to fit the requested size, but no data is copied. Thus, the buffer string provides the previous value of the heap. This may expose possibly sensitive data from the interpreter.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages1 packages

NVDruby-lang/ruby2.5.02.5.7+2

Also affects: Debian Linux 10.0, Fedora 31

🔴Vulnerability Details

4
GHSA
GHSA-g5hm-28jr-53fh: An issue was discovered in Ruby 22022-05-24
OSV
ruby2.3, ruby2.5, ruby2.7 vulnerabilities2021-03-18
OSV
CVE-2020-10933: An issue was discovered in Ruby 22020-05-04
CVEList
CVE-2020-10933: An issue was discovered in Ruby 22020-05-04

📋Vendor Advisories

4
Ubuntu
Ruby vulnerabilities2021-03-18
Microsoft
An issue was discovered in Ruby 2.5.x through 2.5.7 2.6.x through 2.6.5 and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size buffer exception: false) the method resizes the buffer to 2020-05-12
Red Hat
ruby: BasicSocket#read_nonblock method leads to information disclosure2020-03-31
Debian
CVE-2020-10933: ruby2.7 - An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and 2....2020

💬Community

2
Bugzilla
CVE-2020-10933 ruby: BasicSocket#read_nonblock method leads to information disclosure [fedora-all]2020-05-08
Bugzilla
CVE-2020-10933 ruby: BasicSocket#read_nonblock method leads to information disclosure2020-05-08
CVE-2020-10933 — Use of Uninitialized Resource in Ruby | cvebase