CVE-2022-21699

NameCVE-2022-21699
DescriptionIPython (Interactive Python) is a command shell for interactive computing in multiple programming languages, originally developed for the Python programming language. Affected versions are subject to an arbitrary code execution vulnerability achieved by not properly managing cross user temporary files. This vulnerability allows one user to run code as another on the same machine. All users are advised to upgrade.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2896-1, DSA-5065-1, ELA-548-1
Debian Bugs1004122

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ipython (PTS)jessie, jessie (lts)2.3.0-2+deb8u1fixed
stretch (security), stretch (lts), stretch5.1.0-3+deb9u1fixed
buster (security), buster, buster (lts)5.8.0-1+deb10u1fixed
bullseye (security), bullseye7.20.0-1+deb11u1fixed
bookworm8.5.0-4fixed
sid, trixie8.29.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ipythonsourcejessie2.3.0-2+deb8u1ELA-548-1
ipythonsourcestretch5.1.0-3+deb9u1DLA-2896-1
ipythonsourcebuster5.8.0-1+deb10u1DSA-5065-1
ipythonsourcebullseye7.20.0-1+deb11u1DSA-5065-1
ipythonsource(unstable)7.31.1-11004122

Notes

https://github.com/ipython/ipython/security/advisories/GHSA-pq7m-3gw7-gq5x
Fixed by: https://github.com/ipython/ipython/commit/1ec91ebf328bdf3450130de4b4604c79dc1e19d9
Testcase: https://github.com/ipython/ipython/commit/56665dfcf7df8690da46aab1278df8e47b14fe3b
https://ipython.readthedocs.io/en/stable/whatsnew/version8.html#ipython-8-0-1-cve-2022-21699

Search for package or bug name: Reporting problems