Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-8768 (GCVE-0-2018-8768)
Vulnerability from cvelistv5
Published
2018-03-18 06:00
Modified
2024-08-05 07:02
Severity ?
EPSS score ?
Summary
In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T07:02:26.092Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://openwall.com/lists/oss-security/2018/03/15/2", }, { name: "[debian-lts-announce] 20201119 [SECURITY] [DLA 2432-1] jupyter-notebook security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2018-03-18T00:00:00", descriptions: [ { lang: "en", value: "In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-11-19T06:06:12", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://openwall.com/lists/oss-security/2018/03/15/2", }, { name: "[debian-lts-announce] 20201119 [SECURITY] [DLA 2432-1] jupyter-notebook security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-8768", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://openwall.com/lists/oss-security/2018/03/15/2", refsource: "CONFIRM", url: "http://openwall.com/lists/oss-security/2018/03/15/2", }, { name: "[debian-lts-announce] 20201119 [SECURITY] [DLA 2432-1] jupyter-notebook security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-8768", datePublished: "2018-03-18T06:00:00", dateReserved: "2018-03-18T00:00:00", dateUpdated: "2024-08-05T07:02:26.092Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jupyter:notebook:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"5.4.1\", \"matchCriteriaId\": \"728C8890-F455-4178-BB70-4349D7B8D57C\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.\"}, {\"lang\": \"es\", \"value\": \"En Jupyter Notebook, en versiones anteriores a la 5.4.1, un archivo notebook maliciosamente manipulado puede omitir el saneamiento para ejecutar JavaScript en el contexto del notebook. Espec\\u00edficamente, el HTML no v\\u00e1lido es \\\"arreglado\\\" por jQuery tras el saneamiento, haci\\u00e9ndolo peligroso.\"}]", id: "CVE-2018-8768", lastModified: "2024-11-21T04:14:16.680", metrics: "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}", published: "2018-03-18T06:29:00.487", references: "[{\"url\": \"http://openwall.com/lists/oss-security/2018/03/15/2\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://openwall.com/lists/oss-security/2018/03/15/2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2018-8768\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-03-18T06:29:00.487\",\"lastModified\":\"2024-11-21T04:14:16.680\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.\"},{\"lang\":\"es\",\"value\":\"En Jupyter Notebook, en versiones anteriores a la 5.4.1, un archivo notebook maliciosamente manipulado puede omitir el saneamiento para ejecutar JavaScript en el contexto del notebook. Específicamente, el HTML no válido es \\\"arreglado\\\" por jQuery tras el saneamiento, haciéndolo peligroso.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jupyter:notebook:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.4.1\",\"matchCriteriaId\":\"728C8890-F455-4178-BB70-4349D7B8D57C\"}]}]}],\"references\":[{\"url\":\"http://openwall.com/lists/oss-security/2018/03/15/2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://openwall.com/lists/oss-security/2018/03/15/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", }, }
opensuse-su-2024:11242-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
jupyter-notebook-6.2.0-1.4 on GA media
Notes
Title of the patch
jupyter-notebook-6.2.0-1.4 on GA media
Description of the patch
These are all security issues fixed in the jupyter-notebook-6.2.0-1.4 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11242
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "jupyter-notebook-6.2.0-1.4 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the jupyter-notebook-6.2.0-1.4 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-11242", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11242-1.json", }, { category: "self", summary: "SUSE CVE CVE-2016-6524 page", url: "https://www.suse.com/security/cve/CVE-2016-6524/", }, { category: "self", summary: "SUSE CVE CVE-2016-9971 page", url: "https://www.suse.com/security/cve/CVE-2016-9971/", }, { category: "self", summary: "SUSE CVE CVE-2018-14041 page", url: "https://www.suse.com/security/cve/CVE-2018-14041/", }, { category: "self", summary: "SUSE CVE CVE-2018-8768 page", url: "https://www.suse.com/security/cve/CVE-2018-8768/", }, { category: "self", summary: "SUSE CVE CVE-2019-10255 page", url: "https://www.suse.com/security/cve/CVE-2019-10255/", }, { category: "self", summary: "SUSE CVE CVE-2019-11358 page", url: "https://www.suse.com/security/cve/CVE-2019-11358/", }, ], title: "jupyter-notebook-6.2.0-1.4 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:11242-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "jupyter-notebook-6.2.0-1.4.aarch64", product: { name: "jupyter-notebook-6.2.0-1.4.aarch64", product_id: "jupyter-notebook-6.2.0-1.4.aarch64", }, }, { category: "product_version", name: "jupyter-notebook-lang-6.2.0-1.4.aarch64", product: { name: "jupyter-notebook-lang-6.2.0-1.4.aarch64", product_id: "jupyter-notebook-lang-6.2.0-1.4.aarch64", }, }, { category: "product_version", name: "jupyter-notebook-latex-6.2.0-1.4.aarch64", product: { name: "jupyter-notebook-latex-6.2.0-1.4.aarch64", product_id: "jupyter-notebook-latex-6.2.0-1.4.aarch64", }, }, { category: "product_version", name: "python36-notebook-6.2.0-1.4.aarch64", product: { name: "python36-notebook-6.2.0-1.4.aarch64", product_id: "python36-notebook-6.2.0-1.4.aarch64", }, }, { category: "product_version", name: "python36-notebook-lang-6.2.0-1.4.aarch64", product: { name: "python36-notebook-lang-6.2.0-1.4.aarch64", product_id: "python36-notebook-lang-6.2.0-1.4.aarch64", }, }, { category: "product_version", name: "python38-notebook-6.2.0-1.4.aarch64", product: { name: "python38-notebook-6.2.0-1.4.aarch64", product_id: "python38-notebook-6.2.0-1.4.aarch64", }, }, { category: "product_version", name: "python38-notebook-lang-6.2.0-1.4.aarch64", product: { name: "python38-notebook-lang-6.2.0-1.4.aarch64", product_id: "python38-notebook-lang-6.2.0-1.4.aarch64", }, }, { category: "product_version", name: "python39-notebook-6.2.0-1.4.aarch64", product: { name: "python39-notebook-6.2.0-1.4.aarch64", product_id: "python39-notebook-6.2.0-1.4.aarch64", }, }, { category: "product_version", name: "python39-notebook-lang-6.2.0-1.4.aarch64", product: { name: "python39-notebook-lang-6.2.0-1.4.aarch64", product_id: "python39-notebook-lang-6.2.0-1.4.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "jupyter-notebook-6.2.0-1.4.ppc64le", product: { name: "jupyter-notebook-6.2.0-1.4.ppc64le", product_id: "jupyter-notebook-6.2.0-1.4.ppc64le", }, }, { category: "product_version", name: "jupyter-notebook-lang-6.2.0-1.4.ppc64le", product: { name: "jupyter-notebook-lang-6.2.0-1.4.ppc64le", product_id: "jupyter-notebook-lang-6.2.0-1.4.ppc64le", }, }, { category: "product_version", name: "jupyter-notebook-latex-6.2.0-1.4.ppc64le", product: { name: "jupyter-notebook-latex-6.2.0-1.4.ppc64le", product_id: "jupyter-notebook-latex-6.2.0-1.4.ppc64le", }, }, { category: "product_version", name: "python36-notebook-6.2.0-1.4.ppc64le", product: { name: "python36-notebook-6.2.0-1.4.ppc64le", product_id: "python36-notebook-6.2.0-1.4.ppc64le", }, }, { category: "product_version", name: "python36-notebook-lang-6.2.0-1.4.ppc64le", product: { name: "python36-notebook-lang-6.2.0-1.4.ppc64le", product_id: "python36-notebook-lang-6.2.0-1.4.ppc64le", }, }, { category: "product_version", name: "python38-notebook-6.2.0-1.4.ppc64le", product: { name: "python38-notebook-6.2.0-1.4.ppc64le", product_id: "python38-notebook-6.2.0-1.4.ppc64le", }, }, { category: "product_version", name: "python38-notebook-lang-6.2.0-1.4.ppc64le", product: { name: "python38-notebook-lang-6.2.0-1.4.ppc64le", product_id: "python38-notebook-lang-6.2.0-1.4.ppc64le", }, }, { category: "product_version", name: "python39-notebook-6.2.0-1.4.ppc64le", product: { name: "python39-notebook-6.2.0-1.4.ppc64le", product_id: "python39-notebook-6.2.0-1.4.ppc64le", }, }, { category: "product_version", name: "python39-notebook-lang-6.2.0-1.4.ppc64le", product: { name: "python39-notebook-lang-6.2.0-1.4.ppc64le", product_id: "python39-notebook-lang-6.2.0-1.4.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "jupyter-notebook-6.2.0-1.4.s390x", product: { name: "jupyter-notebook-6.2.0-1.4.s390x", product_id: "jupyter-notebook-6.2.0-1.4.s390x", }, }, { category: "product_version", name: "jupyter-notebook-lang-6.2.0-1.4.s390x", product: { name: "jupyter-notebook-lang-6.2.0-1.4.s390x", product_id: "jupyter-notebook-lang-6.2.0-1.4.s390x", }, }, { category: "product_version", name: "jupyter-notebook-latex-6.2.0-1.4.s390x", product: { name: "jupyter-notebook-latex-6.2.0-1.4.s390x", product_id: "jupyter-notebook-latex-6.2.0-1.4.s390x", }, }, { category: "product_version", name: "python36-notebook-6.2.0-1.4.s390x", product: { name: "python36-notebook-6.2.0-1.4.s390x", product_id: "python36-notebook-6.2.0-1.4.s390x", }, }, { category: "product_version", name: "python36-notebook-lang-6.2.0-1.4.s390x", product: { name: "python36-notebook-lang-6.2.0-1.4.s390x", product_id: "python36-notebook-lang-6.2.0-1.4.s390x", }, }, { category: "product_version", name: "python38-notebook-6.2.0-1.4.s390x", product: { name: "python38-notebook-6.2.0-1.4.s390x", product_id: "python38-notebook-6.2.0-1.4.s390x", }, }, { category: "product_version", name: "python38-notebook-lang-6.2.0-1.4.s390x", product: { name: "python38-notebook-lang-6.2.0-1.4.s390x", product_id: "python38-notebook-lang-6.2.0-1.4.s390x", }, }, { category: "product_version", name: "python39-notebook-6.2.0-1.4.s390x", product: { name: "python39-notebook-6.2.0-1.4.s390x", product_id: "python39-notebook-6.2.0-1.4.s390x", }, }, { category: "product_version", name: "python39-notebook-lang-6.2.0-1.4.s390x", product: { name: "python39-notebook-lang-6.2.0-1.4.s390x", product_id: "python39-notebook-lang-6.2.0-1.4.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "jupyter-notebook-6.2.0-1.4.x86_64", product: { name: "jupyter-notebook-6.2.0-1.4.x86_64", product_id: "jupyter-notebook-6.2.0-1.4.x86_64", }, }, { category: "product_version", name: "jupyter-notebook-lang-6.2.0-1.4.x86_64", product: { name: "jupyter-notebook-lang-6.2.0-1.4.x86_64", product_id: "jupyter-notebook-lang-6.2.0-1.4.x86_64", }, }, { category: "product_version", name: "jupyter-notebook-latex-6.2.0-1.4.x86_64", product: { name: "jupyter-notebook-latex-6.2.0-1.4.x86_64", product_id: "jupyter-notebook-latex-6.2.0-1.4.x86_64", }, }, { category: "product_version", name: "python36-notebook-6.2.0-1.4.x86_64", product: { name: "python36-notebook-6.2.0-1.4.x86_64", product_id: "python36-notebook-6.2.0-1.4.x86_64", }, }, { category: "product_version", name: "python36-notebook-lang-6.2.0-1.4.x86_64", product: { name: "python36-notebook-lang-6.2.0-1.4.x86_64", product_id: "python36-notebook-lang-6.2.0-1.4.x86_64", }, }, { category: "product_version", name: "python38-notebook-6.2.0-1.4.x86_64", product: { name: "python38-notebook-6.2.0-1.4.x86_64", product_id: "python38-notebook-6.2.0-1.4.x86_64", }, }, { category: "product_version", name: "python38-notebook-lang-6.2.0-1.4.x86_64", product: { name: "python38-notebook-lang-6.2.0-1.4.x86_64", product_id: "python38-notebook-lang-6.2.0-1.4.x86_64", }, }, { category: "product_version", name: "python39-notebook-6.2.0-1.4.x86_64", product: { name: "python39-notebook-6.2.0-1.4.x86_64", product_id: "python39-notebook-6.2.0-1.4.x86_64", }, }, { category: "product_version", name: "python39-notebook-lang-6.2.0-1.4.x86_64", product: { name: "python39-notebook-lang-6.2.0-1.4.x86_64", product_id: "python39-notebook-lang-6.2.0-1.4.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "jupyter-notebook-6.2.0-1.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.aarch64", }, product_reference: "jupyter-notebook-6.2.0-1.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "jupyter-notebook-6.2.0-1.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.ppc64le", }, product_reference: "jupyter-notebook-6.2.0-1.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "jupyter-notebook-6.2.0-1.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.s390x", }, product_reference: "jupyter-notebook-6.2.0-1.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "jupyter-notebook-6.2.0-1.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.x86_64", }, product_reference: "jupyter-notebook-6.2.0-1.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "jupyter-notebook-lang-6.2.0-1.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.aarch64", }, product_reference: "jupyter-notebook-lang-6.2.0-1.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "jupyter-notebook-lang-6.2.0-1.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.ppc64le", }, product_reference: "jupyter-notebook-lang-6.2.0-1.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "jupyter-notebook-lang-6.2.0-1.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.s390x", }, product_reference: "jupyter-notebook-lang-6.2.0-1.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "jupyter-notebook-lang-6.2.0-1.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.x86_64", }, product_reference: "jupyter-notebook-lang-6.2.0-1.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "jupyter-notebook-latex-6.2.0-1.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.aarch64", }, product_reference: "jupyter-notebook-latex-6.2.0-1.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "jupyter-notebook-latex-6.2.0-1.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.ppc64le", }, product_reference: "jupyter-notebook-latex-6.2.0-1.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "jupyter-notebook-latex-6.2.0-1.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.s390x", }, product_reference: "jupyter-notebook-latex-6.2.0-1.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "jupyter-notebook-latex-6.2.0-1.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.x86_64", }, product_reference: "jupyter-notebook-latex-6.2.0-1.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python36-notebook-6.2.0-1.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.aarch64", }, product_reference: "python36-notebook-6.2.0-1.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python36-notebook-6.2.0-1.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.ppc64le", }, product_reference: "python36-notebook-6.2.0-1.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python36-notebook-6.2.0-1.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.s390x", }, product_reference: "python36-notebook-6.2.0-1.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python36-notebook-6.2.0-1.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.x86_64", }, product_reference: "python36-notebook-6.2.0-1.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python36-notebook-lang-6.2.0-1.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.aarch64", }, product_reference: "python36-notebook-lang-6.2.0-1.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python36-notebook-lang-6.2.0-1.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.ppc64le", }, product_reference: "python36-notebook-lang-6.2.0-1.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python36-notebook-lang-6.2.0-1.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.s390x", }, product_reference: "python36-notebook-lang-6.2.0-1.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python36-notebook-lang-6.2.0-1.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.x86_64", }, product_reference: "python36-notebook-lang-6.2.0-1.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python38-notebook-6.2.0-1.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.aarch64", }, product_reference: "python38-notebook-6.2.0-1.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python38-notebook-6.2.0-1.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.ppc64le", }, product_reference: "python38-notebook-6.2.0-1.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python38-notebook-6.2.0-1.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.s390x", }, product_reference: "python38-notebook-6.2.0-1.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python38-notebook-6.2.0-1.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.x86_64", }, product_reference: "python38-notebook-6.2.0-1.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python38-notebook-lang-6.2.0-1.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.aarch64", }, product_reference: "python38-notebook-lang-6.2.0-1.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python38-notebook-lang-6.2.0-1.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.ppc64le", }, product_reference: "python38-notebook-lang-6.2.0-1.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python38-notebook-lang-6.2.0-1.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.s390x", }, product_reference: "python38-notebook-lang-6.2.0-1.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python38-notebook-lang-6.2.0-1.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.x86_64", }, product_reference: "python38-notebook-lang-6.2.0-1.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python39-notebook-6.2.0-1.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.aarch64", }, product_reference: "python39-notebook-6.2.0-1.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python39-notebook-6.2.0-1.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.ppc64le", }, product_reference: "python39-notebook-6.2.0-1.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python39-notebook-6.2.0-1.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.s390x", }, product_reference: "python39-notebook-6.2.0-1.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python39-notebook-6.2.0-1.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.x86_64", }, product_reference: "python39-notebook-6.2.0-1.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python39-notebook-lang-6.2.0-1.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.aarch64", }, product_reference: "python39-notebook-lang-6.2.0-1.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python39-notebook-lang-6.2.0-1.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.ppc64le", }, product_reference: "python39-notebook-lang-6.2.0-1.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python39-notebook-lang-6.2.0-1.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.s390x", }, product_reference: "python39-notebook-lang-6.2.0-1.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python39-notebook-lang-6.2.0-1.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.x86_64", }, product_reference: "python39-notebook-lang-6.2.0-1.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2016-6524", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6524", }, ], notes: [ { category: "general", text: "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6524", url: "https://www.suse.com/security/cve/CVE-2016-6524", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-6524", }, { cve: "CVE-2016-9971", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9971", }, ], notes: [ { category: "general", text: "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9971", url: "https://www.suse.com/security/cve/CVE-2016-9971", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-9971", }, { cve: "CVE-2018-14041", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14041", }, ], notes: [ { category: "general", text: "In Bootstrap before 4.1.2, XSS is possible in the data-target property of scrollspy.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14041", url: "https://www.suse.com/security/cve/CVE-2018-14041", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-14041", }, { cve: "CVE-2018-8768", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8768", }, ], notes: [ { category: "general", text: "In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8768", url: "https://www.suse.com/security/cve/CVE-2018-8768", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-8768", }, { cve: "CVE-2019-10255", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-10255", }, ], notes: [ { category: "general", text: "An Open Redirect vulnerability for all browsers in Jupyter Notebook before 5.7.7 and some browsers (Chrome, Firefox) in JupyterHub before 0.9.5 allows crafted links to the login page, which will redirect to a malicious site after successful login. Servers running on a base_url prefix are not affected.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-10255", url: "https://www.suse.com/security/cve/CVE-2019-10255", }, { category: "external", summary: "SUSE Bug 1131105 for CVE-2019-10255", url: "https://bugzilla.suse.com/1131105", }, { category: "external", summary: "SUSE Bug 1131652 for CVE-2019-10255", url: "https://bugzilla.suse.com/1131652", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-10255", }, { cve: "CVE-2019-11358", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-11358", }, ], notes: [ { category: "general", text: "jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-11358", url: "https://www.suse.com/security/cve/CVE-2019-11358", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.s390x", "openSUSE Tumbleweed:jupyter-notebook-latex-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python36-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python38-notebook-lang-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-6.2.0-1.4.x86_64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.aarch64", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.ppc64le", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.s390x", "openSUSE Tumbleweed:python39-notebook-lang-6.2.0-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-11358", }, ], }
ghsa-6cwv-x26c-w2q4
Vulnerability from github
Published
2018-07-12 12:00
Modified
2024-09-27 19:51
Severity ?
7.8 (High) - CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.4 (High) - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
8.4 (High) - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Summary
Jupyter Notebook file bypasses sanitization, executes JavaScript
Details
In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.
{ affected: [ { package: { ecosystem: "PyPI", name: "notebook", }, ranges: [ { events: [ { introduced: "0", }, { fixed: "5.4.1", }, ], type: "ECOSYSTEM", }, ], }, ], aliases: [ "CVE-2018-8768", ], database_specific: { cwe_ids: [], github_reviewed: true, github_reviewed_at: "2020-06-16T21:18:58Z", nvd_published_at: null, severity: "HIGH", }, details: "In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.", id: "GHSA-6cwv-x26c-w2q4", modified: "2024-09-27T19:51:01Z", published: "2018-07-12T12:00:00Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-8768", }, { type: "PACKAGE", url: "https://github.com/jupyter/notebook", }, { type: "WEB", url: "https://github.com/pypa/advisory-database/tree/main/vulns/notebook/PYSEC-2018-57.yaml", }, { type: "WEB", url: "https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html", }, { type: "WEB", url: "http://openwall.com/lists/oss-security/2018/03/15/2", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, { score: "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", type: "CVSS_V4", }, ], summary: "Jupyter Notebook file bypasses sanitization, executes JavaScript", }
gsd-2018-8768
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.
Aliases
Aliases
{ GSD: { alias: "CVE-2018-8768", description: "In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.", id: "GSD-2018-8768", references: [ "https://www.suse.com/security/cve/CVE-2018-8768.html", "https://advisories.mageia.org/CVE-2018-8768.html", "https://ubuntu.com/security/CVE-2018-8768", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2018-8768", ], details: "In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.", id: "GSD-2018-8768", modified: "2023-12-13T01:22:34.840910Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-8768", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://openwall.com/lists/oss-security/2018/03/15/2", refsource: "CONFIRM", url: "http://openwall.com/lists/oss-security/2018/03/15/2", }, { name: "[debian-lts-announce] 20201119 [SECURITY] [DLA 2432-1] jupyter-notebook security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html", }, ], }, }, "gitlab.com": { advisories: [ { affected_range: "<5.4.1", affected_versions: "All versions before 5.4.1", cvss_v2: "AV:N/AC:M/Au:N/C:P/I:P/A:P", cvss_v3: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", cwe_ids: [ "CWE-1035", "CWE-937", ], date: "2019-10-03", description: "In Jupyter Notebook, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context.", fixed_versions: [ "5.4.1", ], identifier: "CVE-2018-8768", identifiers: [ "CVE-2018-8768", ], not_impacted: "All versions starting from 5.4.1", package_slug: "pypi/notebook", pubdate: "2018-03-18", solution: "Upgrade to version 5.4.1 or above.", title: "Code Injection", urls: [ "https://nvd.nist.gov/vuln/detail/CVE-2018-8768", ], uuid: "67d8d17d-79b2-43ee-86e9-297ea15bccee", }, ], }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:jupyter:notebook:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "5.4.1", vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-8768", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], }, ], }, references: { reference_data: [ { name: "http://openwall.com/lists/oss-security/2018/03/15/2", refsource: "CONFIRM", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://openwall.com/lists/oss-security/2018/03/15/2", }, { name: "[debian-lts-announce] 20201119 [SECURITY] [DLA 2432-1] jupyter-notebook security update", refsource: "MLIST", tags: [], url: "https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html", }, ], }, }, impact: { baseMetricV2: { cvssV2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: true, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 5.9, }, }, lastModifiedDate: "2020-11-19T07:15Z", publishedDate: "2018-03-18T06:29Z", }, }, }
fkie_cve-2018-8768
Vulnerability from fkie_nvd
Published
2018-03-18 06:29
Modified
2024-11-21 04:14
Severity ?
Summary
In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:jupyter:notebook:*:*:*:*:*:*:*:*", matchCriteriaId: "728C8890-F455-4178-BB70-4349D7B8D57C", versionEndExcluding: "5.4.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.", }, { lang: "es", value: "En Jupyter Notebook, en versiones anteriores a la 5.4.1, un archivo notebook maliciosamente manipulado puede omitir el saneamiento para ejecutar JavaScript en el contexto del notebook. Específicamente, el HTML no válido es \"arreglado\" por jQuery tras el saneamiento, haciéndolo peligroso.", }, ], id: "CVE-2018-8768", lastModified: "2024-11-21T04:14:16.680", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-03-18T06:29:00.487", references: [ { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://openwall.com/lists/oss-security/2018/03/15/2", }, { source: "cve@mitre.org", url: "https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://openwall.com/lists/oss-security/2018/03/15/2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
pysec-2018-57
Vulnerability from pysec
Published
2018-03-18 06:29
Modified
2021-07-15 02:22
Details
In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.
Impacted products
Name | purl |
---|---|
notebook | pkg:pypi/notebook |
Aliases
{ affected: [ { package: { ecosystem: "PyPI", name: "notebook", purl: "pkg:pypi/notebook", }, ranges: [ { events: [ { introduced: "0", }, { fixed: "5.4.1", }, ], type: "ECOSYSTEM", }, ], versions: [ "0.0.0", "4.0.0", "4.0.1", "4.0.2", "4.0.4", "4.0.5", "4.0.6", "4.1.0", "4.2.0", "4.2.0b1", "4.2.1", "4.2.2", "4.2.3", "4.3.0", "4.3.1", "4.3.2", "4.4.0", "4.4.1", "5.0.0", "5.0.0b1", "5.0.0b2", "5.0.0rc1", "5.0.0rc2", "5.1.0", "5.1.0rc1", "5.1.0rc2", "5.1.0rc3", "5.2.0", "5.2.0rc1", "5.2.1", "5.2.1rc1", "5.2.2", "5.3.0", "5.3.0rc1", "5.3.1", "5.4.0", ], }, ], aliases: [ "CVE-2018-8768", "GHSA-6cwv-x26c-w2q4", ], details: "In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.", id: "PYSEC-2018-57", modified: "2021-07-15T02:22:16.276473Z", published: "2018-03-18T06:29:00Z", references: [ { type: "WEB", url: "http://openwall.com/lists/oss-security/2018/03/15/2", }, { type: "WEB", url: "https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html", }, { type: "ADVISORY", url: "https://github.com/advisories/GHSA-6cwv-x26c-w2q4", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.