[Git][security-tracker-team/security-tracker][master] Add CVE-2022-42919/python
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Nov 1 07:46:59 GMT 2022
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
5d9c3b73 by Salvatore Bonaccorso at 2022-11-01T08:46:45+01:00
Add CVE-2022-42919/python
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -5813,8 +5813,20 @@ CVE-2022-3505 (A vulnerability was found in SourceCodester Sanitization Manageme
NOT-FOR-US: SourceCodester
CVE-2022-3504 (A vulnerability was found in SourceCodester Sanitization Management Sy ...)
NOT-FOR-US: SourceCodester
-CVE-2022-42919
+CVE-2022-42919 [Linux specific local privilege escalation via the multiprocessing forkserver start method]
RESERVED
+ - python3.11 <unfixed>
+ - python3.10 <unfixed>
+ - python3.9 <unfixed>
+ - python3.7 <removed>
+ NOTE: https://github.com/python/cpython/issues/97514
+ NOTE: https://github.com/python/cpython/commit/4686d77a04570a663164c03193d9def23c89b122 (3.11-branch)
+ NOTE: https://github.com/python/cpython/commit/eae692eed18892309bcc25a2c0f8980038305ea2 (3.10-branch)
+ NOTE: https://github.com/python/cpython/commit/b43496c01a554cf41ae654a0379efae18609ad39 (3.9-branch)
+ NOTE: The patch for 3.9 and later only removes the default preference for abstract sockets which
+ NOTE: prevents CVE-2022-42919. Versions 3.8.4 and 3.7.8 are not vulnerable by default (but issue present)
+ NOTE: though users need to manually users would need to make specific uncommon multiprocessing API calls
+ NOTE: specifying their own forkserver control socket path.
CVE-2022-3503 (A vulnerability was found in SourceCodester Purchase Order Management ...)
NOT-FOR-US: SourceCodester
CVE-2022-3502 (A vulnerability was found in Human Resource Management System 1.0. It ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5d9c3b738bcecc5abd6ce8d1cd4478acf018bede
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5d9c3b738bcecc5abd6ce8d1cd4478acf018bede
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221101/1ef7f45c/attachment.htm>
More information about the debian-security-tracker-commits
mailing list