ELA-548-1 ipython security update
Package ipython
ELA-548-1 ipython security update
Version 2.3.0-2+deb8u1
Related CVEs CVE-2022-21699
It was discovered that there was a potential arbitrary code execution vulnerability in IPython, the interactive Python shell.
This issue stemmed from IPython executing untrusted files in the current working directory. According to upstream:
Almost all versions of IPython looks for configuration and profiles in current working directory. Since IPython was developed before pip and environments existed, it was used a convenient way to load code/packages in a project dependant way.
In 2022, it is not necessary anymore, and can lead to confusing behavior where for example cloning a repository and starting IPython or loading a notebook from any Jupyter-Compatible interface that has ipython set as a kernel can lead to code execution.
To address this problem, the current working directory is no longer searched for profiles or configuration files.
For Debian 8 Jessie, these problems have been fixed in version 2.3.0-2+deb8u1.
We recommend that you upgrade your ipython packages.
Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/
An ipython security update has been released for Debian GNU/Linux 8 Extended LTS to address a potential arbitrary code execution vulnerability.