A directory traversal vulnerability exists in rack < 2.2.0 that allows an attacker perform directory traversal vulnerability in the Rack::Directory app that is bundled with Rack which could result in information disclosure.
Maintainer, please confirm if we are affected and if so please cleanup affected versions.
As far as I can tell slot 2.1 and 2.2 have only fixed versions in the repository, but slot 1.6 and 2.0 are vulnerable.
Stabling has been superseded by bug 730786
Resetting sanity check; keywords are not fully specified and arches are not CC-ed.
Unable to check for sanity:
> no match for package: dev-ruby/rack-2.2.2
Tree is clean, all done!