Package | ipython |
---|---|
Version | 2.3.0-2+deb8u1 |
Related CVEs | CVE-2022-21699 |
It was discovered that there was a potential arbitrary code execution vulnerability in IPython, the interactive Python shell.
This issue stemmed from IPython executing untrusted files in the current working directory. According to upstream:
Almost all versions of IPython looks for configuration and profiles in current working directory. Since IPython was developed before pip and environments existed, it was used a convenient way to load code/packages in a project dependant way.
In 2022, it is not necessary anymore, and can lead to confusing behavior where for example cloning a repository and starting IPython or loading a notebook from any Jupyter-Compatible interface that has ipython set as a kernel can lead to code execution.
To address this problem, the current working directory is no longer searched for profiles or configuration files.
For Debian 8 Jessie, these problems have been fixed in version 2.3.0-2+deb8u1.
We recommend that you upgrade your ipython packages.
Further information about Extended LTS security advisories can be found in the dedicated section of our website.