Packages
- ipython - Enhanced interactive Python 2 shell
Details
It was discovered that IPython incorrectly processed REST API POST requests.
An attacker could possibly use this issue to launch a cross-site request
forgery (CSRF) attack and leak user’s sensitive information. This issue
only affected Ubuntu 14.04 ESM. (CVE-2015-5607)
It was discovered that IPython did not properly manage cross user temporary
files. A local attacker could possibly use this issue to execute arbitrary
code. This issue only affected Ubuntu 18.04 ESM and Ubuntu 20.04 ESM.
(CVE-2022-21699)
It was discovered that IPython incorrectly processed REST API POST requests.
An attacker could possibly use this issue to launch a cross-site request
forgery (CSRF) attack and leak user’s sensitive information. This issue
only affected Ubuntu 14.04 ESM. (CVE-2015-5607)
It was discovered that IPython did not properly manage cross user temporary
files. A local attacker could possibly use this issue to execute arbitrary
code. This issue only affected Ubuntu 18.04 ESM and Ubuntu 20.04 ESM.
(CVE-2022-21699)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
20.04 focal | python3-ipython – 7.13.0-1ubuntu0.1~esm1 | ||
ipython3 – 7.13.0-1ubuntu0.1~esm1 | |||
18.04 bionic | ipython – 5.5.0-1ubuntu0.1~esm1 | ||
python-ipython – 5.5.0-1ubuntu0.1~esm1 | |||
python3-ipython – 5.5.0-1ubuntu0.1~esm1 | |||
ipython3 – 5.5.0-1ubuntu0.1~esm1 | |||
14.04 trusty | ipython3-notebook – 1.2.1-2ubuntu0.1~esm1 | ||
ipython3 – 1.2.1-2ubuntu0.1~esm1 | |||
ipython-notebook-common – 1.2.1-2ubuntu0.1~esm1 | |||
ipython – 1.2.1-2ubuntu0.1~esm1 | |||
ipython-notebook – 1.2.1-2ubuntu0.1~esm1 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.