CVE-2015-5607

NameCVE-2015-5607
DescriptionCross-site request forgery in the REST API in IPython 2 and 3.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs793123

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ipython (PTS)jessie, jessie (lts)2.3.0-2+deb8u1vulnerable
stretch (security), stretch (lts), stretch5.1.0-3+deb9u1fixed
buster (security), buster, buster (lts)5.8.0-1+deb10u1fixed
bullseye (security), bullseye7.20.0-1+deb11u1fixed
bookworm8.5.0-4fixed
sid, trixie8.29.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ipythonsourcesqueeze(not affected)
ipythonsource(unstable)2.4.1-1793123

Notes

[jessie] - ipython <no-dsa> (Minor issue)
[wheezy] - ipython <no-dsa> (Minor issue)
[squeeze] - ipython <not-affected> (Vulnerable code not present)
https://github.com/ipython/ipython/commit/a05fe052a18810e92d9be8c1185952c13fe4e5b0 (2.x)
https://github.com/ipython/ipython/commit/1415a9710407e7c14900531813c15ba6165f0816 (3.x)
Affected versions: 0.12 <= version <= 3.2.0
https://www.openwall.com/lists/oss-security/2015/07/12/4

Search for package or bug name: Reporting problems