DEBIAN-CVE-2025-59842

Source
https://security-tracker.debian.org/tracker/CVE-2025-59842
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-59842.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2025-59842
Upstream
Published
2025-09-26T16:15:48Z
Modified
2025-09-27T09:16:45.342853Z
Summary
[none]
Details

jupyterlab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook Architecture. Prior to version 4.4.8, links generated with LaTeX typesetters in Markdown files and Markdown cells in JupyterLab and Jupyter Notebook did not include the noopener attribute. This is deemed to have no impact on the default installations. Theoretically users of third-party LaTeX-rendering extensions could find themselves vulnerable to reverse tabnabbing attacks if links generated by those extensions included target=_blank (no such extensions are known at time of writing) and they were to click on a link generated in LaTeX (typically visibly different from other links). This issue has been patched in version 4.4.8.

References

Affected packages

Debian:13 / jupyterlab

Package

Name
jupyterlab
Purl
pkg:deb/debian/jupyterlab?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.0.11+ds1+~cs11.25.27-7

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / jupyterlab

Package

Name
jupyterlab
Purl
pkg:deb/debian/jupyterlab?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.0.11+ds1+~cs11.25.27-7

Ecosystem specific

{
    "urgency": "not yet assigned"
}