MGASA-2014-0320

Source
https://advisories.mageia.org/MGASA-2014-0320.html
Import Source
https://advisories.mageia.org/MGASA-2014-0320.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0320
Related
Published
2014-08-06T10:31:11Z
Modified
2014-08-06T10:20:07Z
Summary
Updated ipython package fixes security vulnerability
Details

In IPython before 1.2, the origin of websocket requests was not verified within the IPython notebook server. If an attacker has knowledge of an IPython kernel id they can run arbitrary code on a user's machine when the client visits a crafted malicious page (CVE-2014-3429).

References
Credits

Affected packages

Mageia:3 / ipython

Package

Name
ipython
Purl
pkg:rpm/mageia/ipython?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.13.2-1.1.mga3

Ecosystem specific

{
    "section": "core"
}

Mageia:4 / ipython

Package

Name
ipython
Purl
pkg:rpm/mageia/ipython?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.0-3.1.mga4

Ecosystem specific

{
    "section": "core"
}