{"id":"USN-7366-2","summary":"ruby-rack vulnerabilities","details":"USN-7366-1 fixed vulnerabilities in Rack. This update provides the\ncorresponding updates for Ubuntu 25.04.\n\nOriginal advisory details:\n\n Nhật Thái Đỗ discovered that Rack incorrectly handled certain usernames. A\n remote attacker could possibly use this issue to perform CRLF injection.\n (CVE-2025-25184)\n\n Phạm Quang Minh discovered that Rack incorrectly handled certain headers. A\n remote attacker could possibly use this issue to perform log injection.\n (CVE-2025-27111)\n\n Phạm Quang Minh discovered that Rack did not properly handle relative file\n paths. A remote attacker could potentially exploit this to include local\n files that should have been inaccessible. (CVE-2025-27610)\n","modified":"2026-01-30T02:37:45.931027Z","published":"2025-07-23T11:50:46.806647Z","related":["UBUNTU-CVE-2025-25184","UBUNTU-CVE-2025-27111","UBUNTU-CVE-2025-27610"],"upstream":["CVE-2025-25184","CVE-2025-27111","CVE-2025-27610","UBUNTU-CVE-2025-25184","UBUNTU-CVE-2025-27111","UBUNTU-CVE-2025-27610"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7366-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-25184"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-27111"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-27610"}],"affected":[{"package":{"name":"ruby-rack","ecosystem":"Ubuntu:25.04","purl":"pkg:deb/ubuntu/ruby-rack@2.2.7-1.1ubuntu0.25.04.2?arch=source&distro=plucky"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.2.7-1.1ubuntu0.25.04.2"}]}],"versions":["2.2.7-1.1","2.2.7-1.1ubuntu0.25.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"2.2.7-1.1ubuntu0.25.04.2","binary_name":"ruby-rack"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7366-2.json","cves_map":{"cves":[{"id":"CVE-2025-25184","severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2025-27111","severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2025-27610","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:25.04"}}}],"schema_version":"1.7.3"}