Bug 2308440 - CVE-2024-43805 jupyterlab: JupyterLab Vulnerability Allows Data Access via Malicious Markdown [fedora-39]
Summary: CVE-2024-43805 jupyterlab: JupyterLab Vulnerability Allows Data Access via Ma...
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Fedora
Classification: Fedora
Component: jupyterlab
Version: 39
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: ---
Assignee: Lumír Balhar
QA Contact:
URL:
Whiteboard: {"flaws": ["78988400-6886-45f3-a3b0-6...
Depends On:
Blocks: CVE-2024-43805
TreeView+ depends on / blocked
 
Reported: 2024-08-29 05:41 UTC by Michal Findra
Modified: 2024-10-08 12:27 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2024-10-08 12:27:35 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Michal Findra 2024-08-29 05:41:07 UTC
More information about this security flaw is available in the following bug:

https://bugzilla.redhat.com/show_bug.cgi?id=2308378

Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

Comment 1 Tomas Orsava 2024-09-11 12:13:40 UTC
JupyterLab v3.6.8, v4.2.5 and Jupyter Notebook v7.2.2 were patched.

Comment 2 Tomas Orsava 2024-09-11 12:14:02 UTC
https://nvd.nist.gov/vuln/detail/CVE-2024-43805

Comment 3 Tomas Orsava 2024-09-25 12:10:39 UTC
This we have v4.2.5 in Fedora 40+, there's no fix yet in Fedora 39.

Comment 4 Lumír Balhar 2024-09-29 07:36:31 UTC
Unfortunately, it's impossible to update jupyterlab and notebook in f39 due to missing dependencies and backporting the patch would require changing how we build these packages.

I'll try to find a way but I don't think I'll make it in time that would make sense for soon-eol Fedora 39.

Comment 5 Lumír Balhar 2024-10-08 12:27:35 UTC
I won't have enough free cycles to fix this in Fedora 39 before the EOL date which is in 5 weeks.


Note You need to log in before you can comment on or make changes to this bug.