A vulnerability in IPython could result in execution of arbitrary JavaScript.
Package | dev-python/ipython on all architectures |
---|---|
Affected versions | < 3.2.1-r1 |
Unaffected versions | >= 3.2.1-r1 |
IPython is an advanced interactive shell for Python.
IPython does not properly check the MIME type of a file.
A remote attacker could entice a user to open a specially crafted text file using IPython, possibly resulting in execution of arbitrary JavaScript with the privileges of the process.
There is no known workaround at this time.
All IPython users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-python/ipython-3.2.1-r1"
Release date
December 17, 2015
Latest revision
December 17, 2015: 1
Severity
normal
Exploitable
remote
Bugzilla entries