CVE-2022-39286 (https://github.com/jupyter/jupyter_core/security/advisories/GHSA-m678-f26j-3hrp): Jupyter Core is a package for the core common functionality of Jupyter projects. Jupyter Core prior to version 4.11.2 contains an arbitrary code execution vulnerability in `jupyter_core` that stems from `jupyter_core` executing untrusted files in CWD. This vulnerability allows one user to run code as another. Version 4.11.2 contains a patch for this issue. There are no known workarounds. Patch: https://github.com/jupyter/jupyter_core/commit/1118c8ce01800cb689d51f655f5ccef19516e283 "allows one user to run code as another", another unprivileged user or potentially the root user? Please stabilize 4.11.2.
Please cleanup
(In reply to John Helmert III from comment #1) > Please cleanup It seems to be clean.
Thanks!
GLSA request filed
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/data/glsa.git/commit/?id=f5b65513c45fa4e74ad48080531fd2a38ed48474 commit f5b65513c45fa4e74ad48080531fd2a38ed48474 Author: GLSAMaker <glsamaker@gentoo.org> AuthorDate: 2023-01-11 05:17:06 +0000 Commit: John Helmert III <ajak@gentoo.org> CommitDate: 2023-01-11 05:22:05 +0000 [ GLSA 202301-04 ] jupyter_core: Arbitrary Code Execution Bug: https://bugs.gentoo.org/878497 Signed-off-by: GLSAMaker <glsamaker@gentoo.org> Signed-off-by: John Helmert III <ajak@gentoo.org> glsa-202301-04.xml | 42 ++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+)
GLSA released, all done!