Update jupyter_core to >=5.8.1 to fix security vulnerability #24
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR addresses a security vulnerability in
jupyter_coreby upgrading from version 5.7.2 to >=5.8.1.Security Issue
The previous version (5.7.2) contains a Local Privilege Escalation Vulnerability on Windows systems due to an "Uncontrolled Search Path Element" issue. This vulnerability could allow attackers to execute malicious code with elevated privileges.
Changes Made
venv_requirements.txtline 34:jupyter_core==5.7.2→jupyter_core>=5.8.1Testing
All existing functionality has been verified to work correctly with the updated dependency:
The change is minimal and surgical, updating only the version constraint for the vulnerable dependency while maintaining full compatibility with the existing codebase.
Security Impact
This update ensures that users of the Pyomo Jupyter Book are protected from the known security vulnerability when working on Windows systems.
💬 Share your feedback on Copilot coding agent for the chance to win a $200 gift card! Click here to start the survey.