Name | CVE-2022-21699 |
Description | IPython (Interactive Python) is a command shell for interactive computing in multiple programming languages, originally developed for the Python programming language. Affected versions are subject to an arbitrary code execution vulnerability achieved by not properly managing cross user temporary files. This vulnerability allows one user to run code as another on the same machine. All users are advised to upgrade. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2896-1, DSA-5065-1 |
Debian Bugs | 1004122 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
ipython (PTS) | bullseye (security), bullseye | 7.20.0-1+deb11u1 | fixed |
bookworm | 8.5.0-4 | fixed | |
sid, trixie | 8.30.0-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
ipython | source | stretch | 5.1.0-3+deb9u1 | DLA-2896-1 | ||
ipython | source | buster | 5.8.0-1+deb10u1 | DSA-5065-1 | ||
ipython | source | bullseye | 7.20.0-1+deb11u1 | DSA-5065-1 | ||
ipython | source | (unstable) | 7.31.1-1 | 1004122 |
https://github.com/ipython/ipython/security/advisories/GHSA-pq7m-3gw7-gq5x
Fixed by: https://github.com/ipython/ipython/commit/1ec91ebf328bdf3450130de4b4604c79dc1e19d9
Testcase: https://github.com/ipython/ipython/commit/56665dfcf7df8690da46aab1278df8e47b14fe3b
https://ipython.readthedocs.io/en/stable/whatsnew/version8.html#ipython-8-0-1-cve-2022-21699