Upstream information

CVE-2024-22415 at MITRE

Description

jupyter-lsp is a coding assistance tool for JupyterLab (code navigation + hover suggestions + linters + autocompletion + rename) using Language Server Protocol. Installations of jupyter-lsp running in environments without configured file system access control (on the operating system level), and with jupyter-server instances exposed to non-trusted network are vulnerable to unauthorised access and modification of file system beyond the jupyter root directory. This issue has been patched in version 2.2.2 and all users are advised to upgrade. Users unable to upgrade should uninstall jupyter-lsp.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having critical severity.

CVSS v3 Scores
  National Vulnerability Database
Base Score 9.8
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
CVSSv3 Version 3.1
SUSE Bugzilla entry: 1218976 [CONFIRMED]

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
openSUSE Tumbleweed
  • jupyter-lsp >= 2.2.2-1.1
  • python310-jupyter-lsp >= 2.2.2-1.1
  • python311-jupyter-lsp >= 2.2.2-1.1
  • python39-jupyter-lsp >= 2.2.2-1.1
Patchnames:
openSUSE Tumbleweed GA jupyter-lsp-2.2.2-1.1


SUSE Timeline for this CVE

CVE page created: Thu Jan 18 23:00:31 2024
CVE page last modified: Tue Jan 30 19:37:35 2024