Skip to content

chore(deps): update dependency ipython to v8.10.0 [security]#33

Open
anaconda-renovate[bot] wants to merge 1 commit into
mainfrom
renovate/pypi-ipython-vulnerability
Open

chore(deps): update dependency ipython to v8.10.0 [security]#33
anaconda-renovate[bot] wants to merge 1 commit into
mainfrom
renovate/pypi-ipython-vulnerability

Conversation

@anaconda-renovate
Copy link
Copy Markdown

@anaconda-renovate anaconda-renovate Bot commented Apr 12, 2026

This PR contains the following updates:

Package Update Change
ipython minor ==8.7.0==8.10.0
renovate update details

Field Value
manager pip_requirements
categories python
datasource pypi
depName ipython
depType¹
packageName ipython
sourceUrl https://github.com/ipython/ipython
updateType minor
versioning pep440

¹ only available for some managers


IPython vulnerable to command injection via set_term_title

CVE-2023-24816 / GHSA-29gw-9793-fvw7 / PYSEC-2023-17

More information

Details

IPython provides an interactive Python shell and Jupyter kernel to use Python interactively. Versions prior to 8.10.0 are vulnerable to command injection in the set_term_title function under specific conditions. This has been patched in version 8.10.0.

Impact

Users are only vulnerable when calling this function in Windows in a Python environment where ctypes is not available. The dependency on ctypes in IPython.utils._process_win32 prevents the vulnerable code from ever being reached (making it effectively dead code). However, as a library that could be used by another tool, set_term_title could introduce a vulnerability for dependencies. Currently set_term_title is only called with (semi-)trusted input that contain the current working directory of the current IPython session. If an attacker can control directory names, and manage to get a user to cd into this directory, then the attacker can execute arbitrary commands contained in the folder names.

Severity

  • CVSS Score: 2.0 / 10 (Low)
  • Vector String: CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


CVE-2023-24816 / GHSA-29gw-9793-fvw7 / PYSEC-2023-17

More information

Details

IPython (Interactive Python) is a command shell for interactive computing in multiple programming languages, originally developed for the Python programming language. Versions prior to 8.1.0 are subject to a command injection vulnerability with very specific prerequisites. This vulnerability requires that the function IPython.utils.terminal.set_term_title be called on Windows in a Python environment where ctypes is not available. The dependency on ctypes in IPython.utils._process_win32 prevents the vulnerable code from ever being reached in the ipython binary. However, as a library that could be used by another tool set_term_title could be called and hence introduce a vulnerability. Should an attacker get untrusted input to an instance of this function they would be able to inject shell commands as current process and limited to the scope of the current process. Users of ipython as a library are advised to upgrade. Users unable to upgrade should ensure that any calls to the IPython.utils.terminal.set_term_title function are done with trusted or filtered input.

Severity

Unknown

References

This data is provided by OSV and the PyPI Advisory Database (CC-BY 4.0).


Release Notes

ipython/ipython (ipython)

v8.10.0

Compare Source

v8.9.0

Compare Source

v8.8.0

Compare Source


Configuration

📅 Schedule: (in timezone UTC)

  • Branch creation
    • ""
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants