Lucene search

K
mageiaGentoo FoundationMGASA-2014-0320
HistoryAug 06, 2014 - 2:31 p.m.

Updated ipython package fixes security vulnerability

2014-08-0614:31:11
Gentoo Foundation
advisories.mageia.org
6

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.006 Low

EPSS

Percentile

79.5%

In IPython before 1.2, the origin of websocket requests was not verified within the IPython notebook server. If an attacker has knowledge of an IPython kernel id they can run arbitrary code on a user’s machine when the client visits a crafted malicious page (CVE-2014-3429).

OSVersionArchitecturePackageVersionFilename
Mageia3noarchipython< 0.13.2-1.1ipython-0.13.2-1.1.mga3
Mageia4noarchipython< 1.1.0-3.1ipython-1.1.0-3.1.mga4

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.006 Low

EPSS

Percentile

79.5%