CVE-2026-34052

LTI JupyterHub Authenticator is a JupyterHub authenticator for LTI. Prior to version 1.6.3, the LTI 1.1 validator stores OAuth nonces in a class-level dictionary that grows without bounds. Nonces are added before signature validation, so an attacker with knowledge of a valid consumer key can send repeated requests with unique nonces to gradually exhaust server memory, causing a denial of service. This issue has been patched in version 1.6.3.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jupyter:lti_jupyterhub_authenticator:*:*:*:*:*:*:*:*

History

13 Apr 2026, 17:44

Type Values Removed Values Added
First Time Jupyter lti Jupyterhub Authenticator
Jupyter
CPE cpe:2.3:a:jupyter:lti_jupyterhub_authenticator:*:*:*:*:*:*:*:*
References () https://github.com/jupyterhub/ltiauthenticator/releases/tag/1.6.3 - () https://github.com/jupyterhub/ltiauthenticator/releases/tag/1.6.3 - Product
References () https://github.com/jupyterhub/ltiauthenticator/security/advisories/GHSA-8mxq-7xr7-2fxj - () https://github.com/jupyterhub/ltiauthenticator/security/advisories/GHSA-8mxq-7xr7-2fxj - Vendor Advisory

03 Apr 2026, 23:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-03 23:17

Updated : 2026-04-13 17:44


NVD link : CVE-2026-34052

Mitre link : CVE-2026-34052

CVE.ORG link : CVE-2026-34052


JSON object : View

Products Affected

jupyter

  • lti_jupyterhub_authenticator
CWE
CWE-401

Missing Release of Memory after Effective Lifetime

CWE-770

Allocation of Resources Without Limits or Throttling