First published: Wed Jan 19 2022(Updated: )
IPython (Interactive Python) is a command shell for interactive computing in multiple programming languages, originally developed for the Python programming language. Affected versions are subject to an arbitrary code execution vulnerability achieved by not properly managing cross user temporary files. This vulnerability allows one user to run code as another on the same machine. All users are advised to upgrade.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ipython Ipython | <=5.10.0 | |
Ipython Ipython | >=6.0.0<7.16.3 | |
Ipython Ipython | >=7.17.0<7.31.1 | |
Ipython Ipython | >=8.0.0<8.0.1 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
pip/ipython | >=8.0.0<8.0.1 | 8.0.1 |
pip/ipython | >=7.17.0<7.31.1 | 7.31.1 |
pip/ipython | >=6.0.0<7.16.3 | 7.16.3 |
pip/ipython | <5.11 | 5.11 |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-21699 is an arbitrary code execution vulnerability in IPython.
IPython versions up to 5.10.0, versions 6.0.0 to 7.16.3, versions 7.17.0 to 7.31.1, and versions 8.0.0 to 8.0.1 are affected.
Update IPython to a version that is not affected by the vulnerability.
CVE-2022-21699 has a severity score of 8.8 (high).
You can find more information about CVE-2022-21699 at the following references: [Reference 1](https://github.com/ipython/ipython/commit/46a51ed69cdf41b4333943d9ceeb945c4ede5668), [Reference 2](https://github.com/ipython/ipython/security/advisories/GHSA-pq7m-3gw7-gq5x), [Reference 3](https://ipython.readthedocs.io/en/stable/whatsnew/version8.html#ipython-8-0-1-cve-2022-21699).