Source: jupyterhub
Version: 5.0.0+ds1-3
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for jupyterhub.

CVE-2024-41942[0]:
| JupyterHub is software that allows one to create a multi-user server
| for Jupyter notebooks. Prior to versions 4.1.6 and 5.1.0, if a user
| is granted the `admin:users` scope, they may escalate their own
| privileges by making themselves a full admin user. The impact is
| relatively small in that `admin:users` is already an extremely
| privileged scope only granted to trusted users. In effect,
| `admin:users` is equivalent to `admin=True`, which is not intended.
| Note that the change here only prevents escalation to the built-in
| JupyterHub admin role that has unrestricted permissions. It does not
| prevent users with e.g. `groups` permissions from granting
| themselves or other users permissions via group membership, which is
| intentional. Versions 4.1.6 and 5.1.0 fix this issue.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-41942
    https://www.cve.org/CVERecord?id=CVE-2024-41942
[1] 
https://github.com/jupyterhub/jupyterhub/security/advisories/GHSA-9x4q-3gxw-849f
[2] 
https://github.com/jupyterhub/jupyterhub/commit/ff2db557a85b6980f90c3158634bf924063ab8ba

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to