Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 730512 (CVE-2020-8161)

Summary: <dev-ruby/rack-2.1.4: Directory Traversal Vulnerability (CVE-2020-8161)
Product: Gentoo Security Reporter: John Helmert III <ajak>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: trivial CC: ruby
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://groups.google.com/forum/?oldui=1#!topic/rubyonrails-security/IOO1vNZTzPA
Whiteboard: C4 [noglsa]
Package list:
Runtime testing required: ---
Bug Depends on: 730786    
Bug Blocks:    

Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2020-07-02 23:34:13 UTC
Description:

A directory traversal vulnerability exists in rack < 2.2.0 that allows an attacker perform directory traversal vulnerability in the Rack::Directory app that is bundled with Rack which could result in information disclosure.


Maintainer, please confirm if we are affected and if so please cleanup affected versions.
Comment 1 Hans de Graaff gentoo-dev Security 2020-07-04 05:02:48 UTC
As far as I can tell slot 2.1 and 2.2 have only fixed versions in the repository, but slot 1.6 and 2.0 are vulnerable.
Comment 2 Hans de Graaff gentoo-dev Security 2020-07-05 08:04:05 UTC
Stabling has been superseded by bug 730786
Comment 3 NATTkA bot gentoo-dev 2020-07-05 08:04:53 UTC
Resetting sanity check; keywords are not fully specified and arches are not CC-ed.
Comment 4 NATTkA bot gentoo-dev 2020-07-23 15:04:41 UTC
Unable to check for sanity:

> no match for package: dev-ruby/rack-2.2.2
Comment 5 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-02-22 02:56:14 UTC
Tree is clean, all done!