Debian 10225 Published by

An ipython security update has been released for Debian GNU/Linux 8 Extended LTS to address a potential arbitrary code execution vulnerability.



ELA-548-1 ipython security update

Package ipython
Version 2.3.0-2+deb8u1
Related CVEs CVE-2022-21699

It was discovered that there was a potential arbitrary code execution vulnerability in IPython, the interactive Python shell.

This issue stemmed from IPython executing untrusted files in the current working directory. According to upstream:

Almost all versions of IPython looks for configuration and profiles in current working directory. Since IPython was developed before pip and environments existed, it was used a convenient way to load code/packages in a project dependant way.

In 2022, it is not necessary anymore, and can lead to confusing behavior where for example cloning a repository and starting IPython or loading a notebook from any Jupyter-Compatible interface that has ipython set as a kernel can lead to code execution.

To address this problem, the current working directory is no longer searched for profiles or configuration files.

For Debian 8 Jessie, these problems have been fixed in version 2.3.0-2+deb8u1.

We recommend that you upgrade your ipython packages.

Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/

  ELA-548-1 ipython security update