Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 386987 (CVE-2011-3624)

Summary: dev-lang/ruby malformed header vulnerabilities (CVE-2011-3624)
Product: Gentoo Security Reporter: Sean Amoss (RETIRED) <ackle>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED OBSOLETE    
Severity: minor CC: ruby
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://www.openwall.com/lists/oss-security/2011/10/12/5
Whiteboard: B4 [upstream+]
Package list:
Runtime testing required: ---

Description Sean Amoss (RETIRED) gentoo-dev Security 2011-10-12 21:58:32 UTC
From $URL:

Various methods in WEBrick::HTTPRequest in Ruby 1.9.2-p290 and
1.8.7-p352 and earlier and do not validate the X-Forwarded-For,
X-Forwarded-Host and X-Forwarded-Server headers in requests, which might
allow remote attackers to inject arbitrary text into log files or bypass
intended address parsing via a crafted header.

https://redmine.ruby-lang.org/issues/5418
Comment 1 Aaron Bauman (RETIRED) gentoo-dev 2016-03-02 10:04:44 UTC
No vulnerable versions in tree.  References as CVE is still reerved: https://security-tracker.debian.org/tracker/CVE-2011-3624 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3624