An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size, buffer, exception: false), the method resizes the buffer to fit the requested size, but no data is copied. Thus, the buffer string provides the previous value of the heap. This may expose possibly sensitive data from the interpreter.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2020-05-04T14:54:00

Updated: 2020-07-08T23:06:16

Reserved: 2020-03-24T00:00:00


Link: CVE-2020-10933

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2020-05-04T15:15:13.963

Modified: 2023-11-07T03:14:25.740


Link: CVE-2020-10933

JSON object: View

cve-icon Redhat Information

No data.

CWE