• Bug#1078344: jupyterhub: CVE-2024-41942

    From Salvatore Bonaccorso@21:1/5 to All on Fri Aug 9 21:20:01 2024
    Source: jupyterhub
    Version: 5.0.0+ds1-3
    Severity: important
    Tags: security upstream
    X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>

    Hi,

    The following vulnerability was published for jupyterhub.

    CVE-2024-41942[0]:
    | JupyterHub is software that allows one to create a multi-user server
    | for Jupyter notebooks. Prior to versions 4.1.6 and 5.1.0, if a user
    | is granted the `admin:users` scope, they may escalate their own
    | privileges by making themselves a full admin user. The impact is
    | relatively small in that `admin:users` is already an extremely
    | privileged scope only granted to trusted users. In effect,
    | `admin:users` is equivalent to `admin=True`, which is not intended.
    | Note that the change here only prevents escalation to the built-in
    | JupyterHub admin role that has unrestricted permissions. It does not
    | prevent users with e.g. `groups` permissions from granting
    | themselves or other users permissions via group membership, which is
    | intentional. Versions 4.1.6 and 5.1.0 fix this issue.


    If you fix the vulnerability please also make sure to include the
    CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

    For further information see:

    [0] https://security-tracker.debian.org/tracker/CVE-2024-41942
    https://www.cve.org/CVERecord?id=CVE-2024-41942
    [1] https://github.com/jupyterhub/jupyterhub/security/advisories/GHSA-9x4q-3gxw-849f
    [2] https://github.com/jupyterhub/jupyterhub/commit/ff2db557a85b6980f90c3158634bf924063ab8ba

    Please adjust the affected versions in the BTS as needed.

    Regards,
    Salvatore

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)