Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 730512 (CVE-2020-8161) - <dev-ruby/rack-2.1.4: Directory Traversal Vulnerability (CVE-2020-8161)
Summary: <dev-ruby/rack-2.1.4: Directory Traversal Vulnerability (CVE-2020-8161)
Status: RESOLVED FIXED
Alias: CVE-2020-8161
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: https://groups.google.com/forum/?oldu...
Whiteboard: C4 [noglsa]
Keywords:
Depends on: CVE-2020-8184
Blocks:
  Show dependency tree
 
Reported: 2020-07-02 23:34 UTC by John Helmert III
Modified: 2021-02-22 02:56 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2020-07-02 23:34:13 UTC
Description:

A directory traversal vulnerability exists in rack < 2.2.0 that allows an attacker perform directory traversal vulnerability in the Rack::Directory app that is bundled with Rack which could result in information disclosure.


Maintainer, please confirm if we are affected and if so please cleanup affected versions.
Comment 1 Hans de Graaff gentoo-dev Security 2020-07-04 05:02:48 UTC
As far as I can tell slot 2.1 and 2.2 have only fixed versions in the repository, but slot 1.6 and 2.0 are vulnerable.
Comment 2 Hans de Graaff gentoo-dev Security 2020-07-05 08:04:05 UTC
Stabling has been superseded by bug 730786
Comment 3 NATTkA bot gentoo-dev 2020-07-05 08:04:53 UTC
Resetting sanity check; keywords are not fully specified and arches are not CC-ed.
Comment 4 NATTkA bot gentoo-dev 2020-07-23 15:04:41 UTC
Unable to check for sanity:

> no match for package: dev-ruby/rack-2.2.2
Comment 5 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-02-22 02:56:14 UTC
Tree is clean, all done!