|
|
Subscribe / Log in / New account

Ubuntu alert USN-7353-1 (plantuml)

From:  John Breton <john.breton@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-7353-1] PlantUML vulnerability
Date:  Mon, 17 Mar 2025 21:22:15 -0400
Message-ID:  <fe34b4aa-b221-4668-8d2b-632a1d3df015@canonical.com>

========================================================================== Ubuntu Security Notice USN-7353-1 March 17, 2025 plantuml vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 24.10 - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: PlantUML could be made to crash or run programs as your login if it opened a specially crafted UML file. Software Description: - plantuml: text-to-UML converter Details: Tobias S. Fink discovered that PlantUML was susceptible to cross-site scripting attacks (XSS) in instances where SVG images were rendered. An attacker could possibly use this issue to cause PlantUML to crash, resulting in a denial of service, or the execution of arbitrary code. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 24.10   plantuml                        1:1.2020.2+ds-5ubuntu0.1 Ubuntu 24.04 LTS   plantuml                        1:1.2020.2+ds-3ubuntu1.1 Ubuntu 22.04 LTS   plantuml                        1:1.2020.2+ds-1ubuntu0.1 Ubuntu 20.04 LTS   plantuml                        1:1.2018.13+ds-2ubuntu0.1~esm1                                   Available with Ubuntu Pro Ubuntu 18.04 LTS   plantuml                        1:1.2017.15-1ubuntu0.1~esm1                                   Available with Ubuntu Pro Ubuntu 16.04 LTS   plantuml                        8024-2ubuntu0.1~esm1                                   Available with Ubuntu Pro In general, a standard system update will make all the necessary changes. References:   https://ubuntu.com/security/notices/USN-7353-1   CVE-2022-1231 Package Information: https://launchpad.net/ubuntu/+source/plantuml/1:1.2020.2+... https://launchpad.net/ubuntu/+source/plantuml/1:1.2020.2+... https://launchpad.net/ubuntu/+source/plantuml/1:1.2020.2+...


Attachment: OpenPGP_signature.asc (type=application/pgp-signature)

-----BEGIN PGP SIGNATURE----- wsF5BAABCAAjFiEEyMDHOTG0YH5UsajI8pSCVQZYHygFAmfYyscFAwAAAAAACgkQ8pSCVQZYHyik VA/+J41AWV/wWlRCHshq9n557BUEENCbM6mqnhFUGNB4OAtCZHY3ycOl/tzkfXF95DRoiBAhSRSx qH6paQNpws4vijHP14wsIrS/w6b3GoXGD2t9bWtiazX6wjZA3MRFKmeW27UMAwL4n/V98dQpZXVo wmfNOIDxg/c1ljsqf1afXl5fiKDnDSXzs/rqvUhrquJpKl9vg3GXOBS7arRaDwJLFhyUD0mCOKjd oLtDEbG6y9y3df2CKUiff1TaER25YkL2TtP6fZLHPcST8Azu71CHyYEHUIIFqs66WUO2EWkcdRLr bCqf58eFjdn5X0k47It3FeamHtmlvV0gj03QPoIvpe5h/C1WhuJgPRIV9QL5blmOtTPG5sCbaKav rseoi8iPtwYLe6+dfapRcZrvcWtsEjU8pnJZEh8X3sDA76nNQgQkLbKMiF9+s1mE4WRnk3Vt5stp yqjpatsTnYwtJANus4v5Q4dI612rzkzpj499cV0zy1mgWClkcJhSHIsEl2C/8A1Pq9aP64qHXyxo 5omys56SP1a8ksJT7hKQwKCEvIJqGlf5t0zPPOECxXErmSVUE0f6YWFpvrIeRqxqQ7HnaNDFhpLv UmhV65fPXLbWzozQAetaKf+5Tlrcjhak23Fm4Sd4wrAR8ftSxR0mBOM5nckaEKYpEkKa1E+lHF4V B08= =D88N -----END PGP SIGNATURE-----


Attachment: None (type=text/plain)


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds