http://bugzilla.opensuse.org/show_bug.cgi?id=1194936 Bug ID: 1194936 Summary: VUL-0: CVE-2022-21699: python-ipython: local arbitrary code execution via temporary files Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.3 Hardware: Other URL: https://smash.suse.de/issue/321200/ OS: Other Status: NEW Severity: Minor Priority: P5 - None Component: Security Assignee: code@bnavigator.de Reporter: carlos.lopez@suse.com QA Contact: security-team@suse.de Found By: Security Response Team Blocker: --- CVE-2022-21699 IPython (Interactive Python) is a command shell for interactive computing in multiple programming languages, originally developed for the Python programming language. Affected versions are subject to an arbitrary code execution vulnerability achieved by not properly managing cross user temporary files. This vulnerability allows one user to run code as another on the same machine. All users are advised to upgrade. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-21699 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21699 https://github.com/ipython/ipython/security/advisories/GHSA-pq7m-3gw7-gq5x https://github.com/ipython/ipython/commit/46a51ed69cdf41b4333943d9ceeb945c4e... https://ipython.readthedocs.io/en/stable/whatsnew/version8.html#ipython-8-0-... -- You are receiving this mail because: You are on the CC list for the bug.