Source: jupyterhub Version: 5.0.0+ds1-3 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for jupyterhub. CVE-2024-41942[0]: | JupyterHub is software that allows one to create a multi-user server | for Jupyter notebooks. Prior to versions 4.1.6 and 5.1.0, if a user | is granted the `admin:users` scope, they may escalate their own | privileges by making themselves a full admin user. The impact is | relatively small in that `admin:users` is already an extremely | privileged scope only granted to trusted users. In effect, | `admin:users` is equivalent to `admin=True`, which is not intended. | Note that the change here only prevents escalation to the built-in | JupyterHub admin role that has unrestricted permissions. It does not | prevent users with e.g. `groups` permissions from granting | themselves or other users permissions via group membership, which is | intentional. Versions 4.1.6 and 5.1.0 fix this issue. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-41942 https://www.cve.org/CVERecord?id=CVE-2024-41942 [1] https://github.com/jupyterhub/jupyterhub/security/advisories/GHSA-9x4q-3gxw-849f [2] https://github.com/jupyterhub/jupyterhub/commit/ff2db557a85b6980f90c3158634bf924063ab8ba Please adjust the affected versions in the BTS as needed. Regards, Salvatore