[Git][security-tracker-team/security-tracker][master] Add CVE-2022-42919/python

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Nov 1 07:46:59 GMT 2022



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
5d9c3b73 by Salvatore Bonaccorso at 2022-11-01T08:46:45+01:00
Add CVE-2022-42919/python

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -5813,8 +5813,20 @@ CVE-2022-3505 (A vulnerability was found in SourceCodester Sanitization Manageme
 	NOT-FOR-US: SourceCodester
 CVE-2022-3504 (A vulnerability was found in SourceCodester Sanitization Management Sy ...)
 	NOT-FOR-US: SourceCodester
-CVE-2022-42919
+CVE-2022-42919 [Linux specific local privilege escalation via the multiprocessing forkserver start method]
 	RESERVED
+	- python3.11 <unfixed>
+	- python3.10 <unfixed>
+	- python3.9 <unfixed>
+	- python3.7 <removed>
+	NOTE: https://github.com/python/cpython/issues/97514
+	NOTE: https://github.com/python/cpython/commit/4686d77a04570a663164c03193d9def23c89b122 (3.11-branch)
+	NOTE: https://github.com/python/cpython/commit/eae692eed18892309bcc25a2c0f8980038305ea2 (3.10-branch)
+	NOTE: https://github.com/python/cpython/commit/b43496c01a554cf41ae654a0379efae18609ad39 (3.9-branch)
+	NOTE: The patch for 3.9 and later only removes the default preference for abstract sockets which
+	NOTE: prevents CVE-2022-42919. Versions 3.8.4 and 3.7.8 are not vulnerable by default (but issue present)
+	NOTE: though users need to manually users would need to make specific uncommon multiprocessing API calls
+	NOTE: specifying their own forkserver control socket path.
 CVE-2022-3503 (A vulnerability was found in SourceCodester Purchase Order Management  ...)
 	NOT-FOR-US: SourceCodester
 CVE-2022-3502 (A vulnerability was found in Human Resource Management System 1.0. It  ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5d9c3b738bcecc5abd6ce8d1cd4478acf018bede

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5d9c3b738bcecc5abd6ce8d1cd4478acf018bede
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221101/1ef7f45c/attachment.htm>


More information about the debian-security-tracker-commits mailing list