Several vulnerabilities have been discovered in jupyter-notebook.
A maliciously forged notebook file can bypass sanitization to execute
'fixed' by jQuery after sanitization, making it dangerous.
allows XSS via an untrusted notebook because nbconvert responses are
considered to have the same origin as the notebook server.
jupyter-notebook does not use a CSP header to treat served files as
belonging to a separate origin. Thus, for example, an XSS payload can
be placed in an SVG document.
For Debian 9 stretch, these problems have been fixed in version
We recommend that you upgrade your jupyter-notebook packages.
For the detailed security status of jupyter-notebook please refer to
its security tracker page at:
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Debian LTS Advisory DLA-2432-1 [email protected]
https://www.debian.org/lts/security/ Abhijith PA
November 19, 2020 https://wiki.debian.org/LTS
Version : 4.2.3-4+deb9u1