Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 242914 - <dev-ruby/rails-2.0.5, <dev-ruby/rails-2.1.2, <dev-lang/ruby-1.8.6_p287-r1 vulnerable to HTTP header attacks
Summary: <dev-ruby/rails-2.0.5, <dev-ruby/rails-2.1.2, <dev-lang/ruby-1.8.6_p287-r1 vu...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All All
: High minor (vote)
Assignee: Gentoo Security
URL: http://weblog.rubyonrails.org/2008/10...
Whiteboard: B4 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2008-10-20 18:42 UTC by Hans de Graaff
Modified: 2009-03-07 18:29 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Hans de Graaff gentoo-dev Security 2008-10-20 18:42:01 UTC
See http://weblog.rubyonrails.org/2008/10/19/response-splitting-risk for a description of this problem. Currently only 2.0.5 is available as a release. The page also mentions 2.2.0, but we currently don't have a 2.2.x release in portage.
Comment 1 Hans de Graaff gentoo-dev Security 2008-10-20 19:38:58 UTC
Rails 2.0.5 is now in CVS. I propose to test this version for at least a week before we stable it.
Comment 2 Alex Legler (RETIRED) archtester gentoo-dev Security 2008-10-20 19:43:31 UTC
This again [1] is a ruby bug that manifests itself mainly in rails.
Ruby upstream are currently deciding on a patch [2], I expect a decision in the next few days.

So, ruby would be on the to-do list, too.

[1] similar to bug #236060
[2] http://article.gmane.org/gmane.comp.lang.ruby.core/18709
Comment 3 Robert Buchholz (RETIRED) gentoo-dev 2008-10-21 14:17:22 UTC
(In reply to comment #1)
> Rails 2.0.5 is now in CVS. I propose to test this version for at least a week
> before we stable it.

Sounds good.
Comment 4 Hans de Graaff gentoo-dev Security 2008-10-24 12:22:50 UTC
Rails 2.1.2 is now in CVS.
Comment 5 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-02-26 16:39:55 UTC
Rails is all fixed, no more vulnerable versions in the tree, everything stable.

Ruby upstream obviously have no reason to fix this, it didn't even get any response on the dev ML.
After talking to rbu, we don't want to derivate from upstream and so don't patch this into Ruby.

So, do we need a GLSA for rails? I'd say NO.
Comment 6 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2009-02-27 22:42:02 UTC
as for me, HTTP response splitting and header injection is mainly a vector attack and has no security impact by itself, but only together with another application vulnerability. So, unless there is a serious security issue (code injection, sql injection, denial of service, privelege escalation) caused by this bug on a standard application, i would say noglsa.

And i'm rerating to B4 and severity is "Minor" for both B3 and B4.
Comment 7 Stefan Behte (RETIRED) gentoo-dev Security 2009-03-07 18:29:33 UTC
NO, too. Closing.