Source: jupyter-notebook
Version: 4.2.3-4
Severity: grave
Tags: patch security upstream

Hi,

the following vulnerability was published for jupyter-notebook.

CVE-2018-8768[0]:
| In Jupyter Notebook before 5.4.1, a maliciously forged notebook file
| can bypass sanitization to execute JavaScript in the notebook context.
| Specifically, invalid HTML is 'fixed' by jQuery after sanitization,
| making it dangerous.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2018-8768
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8768
[1] http://www.openwall.com/lists/oss-security/2018/03/15/2
[2] 
https://github.com/jupyter/notebook/commit/4e79ebb49acac722b37b03f1fe811e67590d3831

Regards,
Salvatore

Reply via email to