Safety vulnerability ID: 34645
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Notebook 4.3.1 includes a patch for a CSRF vulnerability.
https://github.com/jupyter/notebook/pull/1969
https://blog.jupyter.org/security-release-jupyter-notebook-4-3-1-808e1f3bb5e2
Latest version: 7.3.2
Jupyter Notebook - A web-based notebook environment for interactive computing
4.3.1 is a patch release with a security patch, a couple bug fixes, and improvements to the newly-released token authentication.
Bug fixes:
- Fix carriage return handling
- Make the font size more robust against fickle brow
- Ignore resize events that bubbled up and didn't come from window
Other improvements:
- Better docs for token-based authentication
- Further highlight token info in log output when autogenerated
- Add Authorization to allowed CORS headers
See the 4.3.1 milestone on GitHub for a complete list of [issues](https://github.com/jupyter/notebook/issues?utf8=%E2%9C%93&q=is%3Aissue%20milestone%3A4.3.1%20)
and [pull requests](https://github.com/jupyter/notebook/pulls?utf8=%E2%9C%93&q=is%3Apr%20milestone%3A4.3.1%20) involved in this release.
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application