Bugzilla – Bug 947508
VUL-1: CVE-2015-7337: ipython: Maliciously crafted files can be executed due to wrong file type determination
Last modified: 2017-08-10 14:22:31 UTC
rh#1264067 A vulnerability in IPython allowing maliciously forged file to be opened for editing that could execute javascript code, specifically by being redirected to /files/ due to the mistakenly treating the file as plain text. Versions >= 3.0 and <= 3.2.1 of IPython are affected. Upstream patch: https://github.com/ipython/ipython/commit/0a8096adf165e2465550bd5893d7e352544e5967 References: https://bugzilla.redhat.com/show_bug.cgi?id=1264067 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7337 http://seclists.org/oss-sec/2015/q3/634 http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-7337.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7337
looks like just Factory and Leap are affected.
bugbot adjusting priority
fixed