Mageia alert MGASA-2014-0320 (ipython)
From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2014-0320: Updated ipython package fixes security vulnerability | |
Date: | Wed, 6 Aug 2014 12:31:27 +0200 | |
Message-ID: | <20140806103127.2D7D55CA7F@valstar.mageia.org> |
MGASA-2014-0320 - Updated ipython package fixes security vulnerability Publication date: 06 Aug 2014 URL: http://advisories.mageia.org/MGASA-2014-0320.html Type: security Affected Mageia releases: 3, 4 CVE: CVE-2014-3429 Description: In IPython before 1.2, the origin of websocket requests was not verified within the IPython notebook server. If an attacker has knowledge of an IPython kernel id they can run arbitrary code on a user's machine when the client visits a crafted malicious page (CVE-2014-3429). References: - https://bugs.mageia.org/show_bug.cgi?id=13744 - http://openwall.com/lists/oss-security/2014/07/15/2 - https://lists.fedoraproject.org/pipermail/package-announc... - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3429 SRPMS: - 4/core/ipython-1.1.0-3.1.mga4 - 3/core/ipython-0.13.2-1.1.mga3