{"id":"USN-4561-2","summary":"ruby-rack vulnerabilities","details":"USN-4561-1 fixed vulnerabilities in Rack. This update provides the\ncorresponding update for Ubuntu 16.04 LTS, Ubuntu 20.04 LTS and Ubuntu 20.10.\n\nOriginal advisory details:\n\n It was discovered that Rack incorrectly handled certain paths. An attacker\n could possibly use this issue to obtain sensitive information. This issue\n only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.\n (CVE-2020-8161)\n\n It was discovered that Rack incorrectly validated cookies. An attacker\n could possibly use this issue to forge a secure cookie. (CVE-2020-8184)\n","modified":"2026-02-10T04:41:56Z","published":"2021-04-06T11:13:44Z","related":["UBUNTU-CVE-2020-8161","UBUNTU-CVE-2020-8184"],"upstream":["CVE-2020-8161","CVE-2020-8184","UBUNTU-CVE-2020-8161","UBUNTU-CVE-2020-8184"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4561-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-8161"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-8184"}],"affected":[{"package":{"name":"ruby-rack","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/ruby-rack@1.6.4-3ubuntu0.2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.6.4-3ubuntu0.2"}]}],"versions":["1.5.2-4","1.6.4-2","1.6.4-3","1.6.4-3ubuntu0.1"],"ecosystem_specific":{"binaries":[{"binary_name":"ruby-rack","binary_version":"1.6.4-3ubuntu0.2"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4561-2.json","cves_map":{"cves":[{"id":"CVE-2020-8161","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2020-8184","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:16.04:LTS"}}},{"package":{"name":"ruby-rack","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/ruby-rack@2.0.7-2ubuntu0.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.7-2ubuntu0.1"}]}],"versions":["2.0.6-3","2.0.7-2"],"ecosystem_specific":{"binaries":[{"binary_name":"ruby-rack","binary_version":"2.0.7-2ubuntu0.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4561-2.json","cves_map":{"cves":[{"id":"CVE-2020-8161","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2020-8184","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:20.04:LTS"}}}],"schema_version":"1.7.3"}