drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in SnakeYAML
| Name: |
Denial of Service in SnakeYAML |
|
| ID: |
USN-7368-1 |
|
| Distribution: |
Ubuntu |
|
| Plattformen: |
Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS |
|
| Datum: |
Do, 27. März 2025, 18:31 |
|
| Referenzen: |
https://www.cve.org/CVERecord?id=CVE-2017-18640 |
|
| Applikationen: |
SnakeYAML |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============1795358397542939809== Content-Language: en-US Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------kF7luU1i1byhYgTl7Vr6TisU"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------kF7luU1i1byhYgTl7Vr6TisU Content-Type: multipart/mixed; boundary="------------Eej14jgy0BAAh1I32qKXehU4"; protected-headers="v1" From: John Breton <john.breton@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <64911037-adbb-4365-9c8c-7caac664ab8b@canonical.com> Subject: [USN-7368-1] SnakeYAML vulnerability
--------------Eej14jgy0BAAh1I32qKXehU4 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-7368-1 March 27, 2025
snakeyaml vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS
Summary:
SnakeYAML could be made to crash if it received specially crafted input.
Software Description: - snakeyaml: YAML parser and emitter for the Java programming language
Details:
It was discovered that SnakeYAML incorrectly handled recursive entity references. An attacker could possibly use this issue to cause SnakeYAML to crash, resulting in a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.04 LTS libyaml-snake-java 1.25+ds-2ubuntu0.1+esm1 Available with Ubuntu Pro
Ubuntu 18.04 LTS libyaml-snake-java 1.23-1+deb10u1ubuntu0.1~esm1 Available with Ubuntu Pro
Ubuntu 16.04 LTS libyaml-snake-java 1.12-2ubuntu0.16.04.1~esm2 Available with Ubuntu Pro
Ubuntu 14.04 LTS libyaml-snake-java 1.12-2ubuntu0.14.04.1~esm2 Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-7368-1 CVE-2017-18640
--------------Eej14jgy0BAAh1I32qKXehU4--
--------------kF7luU1i1byhYgTl7Vr6TisU Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc"
-----BEGIN PGP SIGNATURE-----
wsF5BAABCAAjFiEEyMDHOTG0YH5UsajI8pSCVQZYHygFAmfldx4FAwAAAAAACgkQ8pSCVQZYHyjJ UA/+PfnrLP37YcPazrOKGFoTwEKmyPikLXwtz+vromRtqwqB4gksjpf7zcVVMnvltZ+SXzrPZHxc wtAqtUcrQYJvLLelyOAVy8AfKrlB34Mg/IumJV29NnwcysvPrkMX3Gr+Kddc8y9DMVJI6UHmOgrv 29Qsyg7pt3+KbHE08yOJO0i8jS/rufVe5Ufa+050FtV9leJnmUzq6VgPtR+t64w97HuuxRQUVBre 5z7uyStg8qm2yTaUe+WDzPPL7DqNsWUnTlanmKAmkZFW60rWvm/Lf1JxxpoKWAvqjOQe1csYKNvg PsR7HaCe0JuCW6AJLs+2yt7C3aNkuNPMljDpCXqaRSwGrbppZm2QQWiQT5Vh7hCerFPkK0SXfrSY UKR9WK4Gw1gIygwgC8xQve5sUPIwCftZZ9gDZnQVB6MUvnvvM6O1fiv04FRKU7VclBa43VZyqBH9 N7c4RkGpKk45MfzBzOgeebK6rDu3LPDnZApC3OxN75g9Gjb5pgWzu0k0aRMDRHhFn6r0LI6E4Vd4 eN6ZaOTtPG3xeBuPdmnuHZrmADySlb6xcoFcQJijzRbotVj2b3aOu6wn/W4Fk5kXIdh7pxLjg8bu 8eqsYPoKY1oalHbbW94lyqQ6sPj95+regR2XoXCYNAf62j01Ft8xNQVbTIvDJellr5cUv9loXtZK g/k= =os7a -----END PGP SIGNATURE-----
--------------kF7luU1i1byhYgTl7Vr6TisU--
--===============1795358397542939809== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============1795358397542939809==--
|
|
|
|