Headline
Ubuntu Security Notice USN-5953-1
Ubuntu Security Notice 5953-1 - It was discovered that IPython incorrectly processed REST API POST requests. An attacker could possibly use this issue to launch a cross-site request forgery attack and leak user’s sensitive information. This issue only affected Ubuntu 14.04 ESM. It was discovered that IPython did not properly manage cross user temporary files. A local attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 18.04 ESM and Ubuntu 20.04 ESM.
==========================================================================
Ubuntu Security Notice USN-5953-1
March 15, 2023
ipython vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 14.04 ESM
Summary:
Several security issues were fixed in IPython.
Software Description:
- ipython: Enhanced interactive Python 3 shell
Details:
It was discovered that IPython incorrectly processed REST API POST requests.
An attacker could possibly use this issue to launch a cross-site request
forgery (CSRF) attack and leak user’s sensitive information. This issue
only affected Ubuntu 14.04 ESM. (CVE-2015-5607)
It was discovered that IPython did not properly manage cross user temporary
files. A local attacker could possibly use this issue to execute arbitrary
code. This issue only affected Ubuntu 18.04 ESM and Ubuntu 20.04 ESM.
(CVE-2022-21699)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS:
ipython3 7.13.0-1ubuntu0.1~esm1
python3-ipython 7.13.0-1ubuntu0.1~esm1
Ubuntu 18.04 LTS:
ipython 5.5.0-1ubuntu0.1~esm1
ipython3 5.5.0-1ubuntu0.1~esm1
python-ipython 5.5.0-1ubuntu0.1~esm1
python3-ipython 5.5.0-1ubuntu0.1~esm1
Ubuntu 14.04 ESM:
ipython 1.2.1-2ubuntu0.1~esm1
ipython-notebook 1.2.1-2ubuntu0.1~esm1
ipython-notebook-common 1.2.1-2ubuntu0.1~esm1
ipython3 1.2.1-2ubuntu0.1~esm1
ipython3-notebook 1.2.1-2ubuntu0.1~esm1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5953-1
CVE-2015-5607, CVE-2022-21699
Package Information:
Related news
Dell Streaming Data Platform prior to 1.4 contains Open Redirect vulnerability. An attacker with privileges same as a legitimate user can phish the legitimate the user to redirect to malicious website leading to information disclosure and launch of phishing attacks.