chore(deps): update dependency jupyterlab to v4.0.11 [security] #600
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
4.0.9
->4.0.11
GitHub Vulnerability Alerts
CVE-2024-22420
Impact
The vulnerability depends on user interaction by opening a malicious notebook with Markdown cells, or Markdown file using JupyterLab preview feature.
A malicious user can access any data that the attacked user has access to as well as perform arbitrary requests acting as the attacked user.
Patches
JupyterLab v4.0.11 was patched.
Workarounds
Users can either disable the table of contents extension by running:
References
Vulnerability reported via the bug bounty program sponsored by the European Commission and hosted on the Intigriti platform.
CVE-2024-22421
Impact
Users of JupyterLab who click on a malicious link may get their
Authorization
andXSRFToken
tokens exposed to a third party when running an olderjupyter-server
version.Patches
JupyterLab 4.1.0b2, 4.0.11, and 3.6.7 were patched.
Workarounds
No workaround has been identified, however users should ensure to upgrade
jupyter-server
to version 2.7.2 or newer which includes a redirect vulnerability fix.References
Vulnerability reported by user @davwwwx via the bug bounty program sponsored by the European Commission and hosted on the Intigriti platform.
Release Notes
jupyterlab/jupyterlab (jupyterlab)
v4.0.11
Compare Source
4.0.11
(Full Changelog)
Security fixes
Bugs fixed
Documentation improvements
Contributors to this release
(GitHub contributors page for this release)
@brichet | @fcollonval | @github-actions | @jtpio | @jupyterlab-probot | @krassowski | @meeseeksmachine | @misterfads | @welcome
v4.0.10
Compare Source
4.0.10
(Full Changelog)
Bugs fixed
jupyter labextension watch --help
#15542 (@akx)FormComponent
showing error indicators in all fields when using acustomValidate
function #15464 (@mmichilot)Maintenance and upkeep improvements
actions/labeler
to v4 to fix failing CI action #15496 (@krassowski)Documentation improvements
Contributors to this release
(GitHub contributors page for this release)
@afshin | @brichet | @davidbrochart | @echarles | @fcollonval | @g547315 | @gabalafou | @GabrielaVives | @github-actions | @j264415 | @jtpio | @jupyterlab-probot | @krassowski | @lumberbot-app | @meeseeksmachine | @parmentelat | @tonyfast | @welcome | @Wh1isper
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about these updates again.
This PR was generated by Mend Renovate. View the repository job log.