drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in PlantUML
| Name: |
Ausführen beliebiger Kommandos in PlantUML |
|
| ID: |
USN-7353-1 |
|
| Distribution: |
Ubuntu |
|
| Plattformen: |
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 24.10 |
|
| Datum: |
Di, 18. März 2025, 07:11 |
|
| Referenzen: |
https://launchpad.net/ubuntu/+source/plantuml/1:1.2020.2+ds-3ubuntu1.1
https://launchpad.net/ubuntu/+source/plantuml/1:1.2020.2+ds-5ubuntu0.1
https://www.cve.org/CVERecord?id=CVE-2022-1231
https://launchpad.net/ubuntu/+source/plantuml/1:1.2020.2+ds-1ubuntu0.1 |
|
| Applikationen: |
PlantUML |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============6131512553549519564== Content-Language: en-US Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------8XqVkrxAdKfLOev082bgmDY2"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------8XqVkrxAdKfLOev082bgmDY2 Content-Type: multipart/mixed; boundary="------------uLCflWOu0gdLqhq552ictM6c"; protected-headers="v1" From: John Breton <john.breton@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <fe34b4aa-b221-4668-8d2b-632a1d3df015@canonical.com> Subject: [USN-7353-1] PlantUML vulnerability
--------------uLCflWOu0gdLqhq552ictM6c Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-7353-1 March 17, 2025
plantuml vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.10 - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS
Summary:
PlantUML could be made to crash or run programs as your login if it opened a specially crafted UML file.
Software Description: - plantuml: text-to-UML converter
Details:
Tobias S. Fink discovered that PlantUML was susceptible to cross-site scripting attacks (XSS) in instances where SVG images were rendered. An attacker could possibly use this issue to cause PlantUML to crash, resulting in a denial of service, or the execution of arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 24.10 plantuml 1:1.2020.2+ds-5ubuntu0.1
Ubuntu 24.04 LTS plantuml 1:1.2020.2+ds-3ubuntu1.1
Ubuntu 22.04 LTS plantuml 1:1.2020.2+ds-1ubuntu0.1
Ubuntu 20.04 LTS plantuml 1:1.2018.13+ds-2ubuntu0.1~esm1 Available with Ubuntu Pro
Ubuntu 18.04 LTS plantuml 1:1.2017.15-1ubuntu0.1~esm1 Available with Ubuntu Pro
Ubuntu 16.04 LTS plantuml 8024-2ubuntu0.1~esm1 Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-7353-1 CVE-2022-1231
Package Information: https://launchpad.net/ubuntu/+source/plantuml/1:1.2020.2+ds-5ubuntu0.1 https://launchpad.net/ubuntu/+source/plantuml/1:1.2020.2+ds-3ubuntu1.1 https://launchpad.net/ubuntu/+source/plantuml/1:1.2020.2+ds-1ubuntu0.1
--------------uLCflWOu0gdLqhq552ictM6c--
--------------8XqVkrxAdKfLOev082bgmDY2 Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc"
-----BEGIN PGP SIGNATURE-----
wsF5BAABCAAjFiEEyMDHOTG0YH5UsajI8pSCVQZYHygFAmfYyscFAwAAAAAACgkQ8pSCVQZYHyik VA/+J41AWV/wWlRCHshq9n557BUEENCbM6mqnhFUGNB4OAtCZHY3ycOl/tzkfXF95DRoiBAhSRSx qH6paQNpws4vijHP14wsIrS/w6b3GoXGD2t9bWtiazX6wjZA3MRFKmeW27UMAwL4n/V98dQpZXVo wmfNOIDxg/c1ljsqf1afXl5fiKDnDSXzs/rqvUhrquJpKl9vg3GXOBS7arRaDwJLFhyUD0mCOKjd oLtDEbG6y9y3df2CKUiff1TaER25YkL2TtP6fZLHPcST8Azu71CHyYEHUIIFqs66WUO2EWkcdRLr bCqf58eFjdn5X0k47It3FeamHtmlvV0gj03QPoIvpe5h/C1WhuJgPRIV9QL5blmOtTPG5sCbaKav rseoi8iPtwYLe6+dfapRcZrvcWtsEjU8pnJZEh8X3sDA76nNQgQkLbKMiF9+s1mE4WRnk3Vt5stp yqjpatsTnYwtJANus4v5Q4dI612rzkzpj499cV0zy1mgWClkcJhSHIsEl2C/8A1Pq9aP64qHXyxo 5omys56SP1a8ksJT7hKQwKCEvIJqGlf5t0zPPOECxXErmSVUE0f6YWFpvrIeRqxqQ7HnaNDFhpLv UmhV65fPXLbWzozQAetaKf+5Tlrcjhak23Fm4Sd4wrAR8ftSxR0mBOM5nckaEKYpEkKa1E+lHF4V B08= =D88N -----END PGP SIGNATURE-----
--------------8XqVkrxAdKfLOev082bgmDY2--
--===============6131512553549519564== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============6131512553549519564==--
|
|
|
|