SB2023061232 - Privilege escalation in Jupyter Core
Published: June 12, 2023 Updated: June 13, 2023
Security Bulletin ID
SB2023061232
Severity
Low
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Local access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Untrusted search path (CVE-ID: CVE-2022-39286)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to jupyter_core executes untrused files from the current working directory. A local user can place a malicious file on the system and execute arbitrary code with elevated privileges.Remediation
Install update from vendor's website.
References
- https://github.com/jupyter/jupyter_core/commit/1118c8ce01800cb689d51f655f5ccef19516e283
- https://github.com/jupyter/jupyter_core/security/advisories/GHSA-m678-f26j-3hrp
- https://lists.debian.org/debian-lts-announce/2022/11/msg00022.html
- https://security.gentoo.org/glsa/202301-04
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KKMP5OXXIX2QAUNVNJZ5UEQFKDYYJVBA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YIDN7JMLK6AOMBQI4QPSW4MBQGWQ5NIN/
- https://www.debian.org/security/2023/dsa-5422