{"id":"USN-7366-2","summary":"ruby-rack vulnerabilities","details":"USN-7366-1 fixed vulnerabilities in Rack. This update provides the\ncorresponding updates for Ubuntu 25.04.\n\nOriginal advisory details:\n\n Nhật Thái Đỗ discovered that Rack incorrectly handled certain usernames. A\n remote attacker could possibly use this issue to perform CRLF injection.\n (CVE-2025-25184)\n\n Phạm Quang Minh discovered that Rack incorrectly handled certain headers. A\n remote attacker could possibly use this issue to perform log injection.\n (CVE-2025-27111)\n\n Phạm Quang Minh discovered that Rack did not properly handle relative file\n paths. A remote attacker could potentially exploit this to include local\n files that should have been inaccessible. (CVE-2025-27610)\n","modified":"2026-02-04T02:26:09.671277Z","published":"2025-07-23T11:50:46.806647Z","related":["UBUNTU-CVE-2025-25184","UBUNTU-CVE-2025-27111","UBUNTU-CVE-2025-27610"],"upstream":["CVE-2025-25184","CVE-2025-27111","CVE-2025-27610","UBUNTU-CVE-2025-25184","UBUNTU-CVE-2025-27111","UBUNTU-CVE-2025-27610"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7366-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-25184"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-27111"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-27610"}],"affected":[{"package":{"name":"ruby-rack","ecosystem":"Ubuntu:25.04","purl":"pkg:deb/ubuntu/ruby-rack@2.2.7-1.1ubuntu0.25.04.2?arch=source&distro=plucky"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.2.7-1.1ubuntu0.25.04.2"}]}],"versions":["2.2.7-1.1","2.2.7-1.1ubuntu0.25.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"2.2.7-1.1ubuntu0.25.04.2","binary_name":"ruby-rack"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:25.04","cves":[{"severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2025-25184"},{"severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2025-27111"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2025-27610"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7366-2.json"}}],"schema_version":"1.7.3"}