-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2896-1 debian-...@lists.debian.org https://www.debian.org/lts/security/ Chris Lamb January 24, 2022 https://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : ipython Version : 5.1.0-3+deb9u1 CVE ID : CVE-2022-21699 Debian Bug : #1004122 It was discovered that there was a potential arbitrary code execution vulnerability in IPython, the interactive Python shell. This issue stemmed from IPython executing untrusted files in the current working directory. According to upstream: Almost all versions of IPython looks for configuration and profiles in current working directory. Since IPython was developed before pip and environments existed, it was used a convenient way to load code/packages in a project dependant way. In 2022, it is not necessary anymore, and can lead to confusing behavior where for example cloning a repository and starting IPython or loading a notebook from any Jupyter-Compatible interface that has ipython set as a kernel can lead to code execution. To address this problem, the current working directory is no longer searched for profiles or configuration files. For Debian 9 "Stretch", this problem has been fixed in version 5.1.0-3+deb9u1. We recommend that you upgrade your ipython packages. For the detailed security status of ipython please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ipython Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEwv5L0nHBObhsUz5GHpU+J9QxHlgFAmHu1XkACgkQHpU+J9Qx HlhkXw//SDfDolXM6099Ue+yC47ZhOWUcFCfsJt7k7ox1SZv50lPlT63fzBgdZmN 3bJPpzTww2NMD0i/n9qDyu3yycrYOmrymnSwe10TZAiP3IVJDXwER9yRsTTlj7+v F0FOLNZvydVD8IqxV8BeHRRHeusiR0DaQLS+6TgbOOKiUzBweI9xsMcq4ZCmdZ64 Bq/cXzXDj3/DCMpH/4ArlmO2shLD6ay6t78vf9DT+pf5+Ex5I7iDqbRz6KjQYN3x FLeDVSYE+8TcSmmfYG562JUgwO/0+UTJusVI2Yl15FhafmKIDaNaFuq/XQagjvb1 VOoUmIjCkh07IzT+7Ue7MJeDWB7I9hHDpH/j5x1JdIOWreIO2rv8u2GNKKKZclzH qCJOjrig93uTHKbzhcQR+azZA1WCwP4/6CGtrZfeJv1GrOIDZzxroLzJkCRahiNz /3FWRhi0aYGe/DjlMkKM0UufIMRcteNi506LQtItmjuJwaDuqpFz+TqknAMuB2hG zKn9P/MMq5Jm8SpnEBHsfAb4pX7uxhlrbrbjeZ8fCvtPcCDsaaAjrXlZyY2n4Bb5 H5DL9O2ZSqvrVkzYv98YbCSFAZMVPRn8B06LKtO+5snXUA2IR9pm9aZD06q4rBmI BPiIfmMkC0oJe2Mif22sRe5+udR+Iyn8LKd8ohV8xo7hO7w5TKs= =UFlN -----END PGP SIGNATURE-----