First published: Tue Apr 06 2021(Updated: )
USN-4561-1 fixed vulnerabilities in Rack. This update provides the corresponding update for Ubuntu 16.04 LTS, Ubuntu 20.04 LTS and Ubuntu 20.10. Original advisory details: It was discovered that Rack incorrectly handled certain paths. An attacker could possibly use this issue to obtain sensitive information. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-8161) It was discovered that Rack incorrectly validated cookies. An attacker could possibly use this issue to forge a secure cookie. (CVE-2020-8184)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/ruby-rack | <2.1.1-5ubuntu0.1 | 2.1.1-5ubuntu0.1 |
Ubuntu Ubuntu | =20.10 | |
All of | ||
ubuntu/ruby-rack | <2.0.7-2ubuntu0.1 | 2.0.7-2ubuntu0.1 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/ruby-rack | <1.6.4-3ubuntu0.2 | 1.6.4-3ubuntu0.2 |
Ubuntu Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this advisory is USN-4561-2.
The severity of USN-4561-2 is not provided in the advisory. Please refer to the provided references for more information.
The affected software by USN-4561-2 is Ruby Rack versions 2.1.1-5ubuntu0.1, 2.0.7-2ubuntu0.1, and 1.6.4-3ubuntu0.2 on Ubuntu 16.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 20.10.
To fix the vulnerability in Ruby Rack, update the package to the recommended version mentioned in the advisory.
You can find more information about the vulnerabilities fixed by USN-4561-2 in the provided references: [CVE-2020-8161](https://ubuntu.com/security/CVE-2020-8161) and [CVE-2020-8184](https://ubuntu.com/security/CVE-2020-8184).