[Git][security-tracker-team/security-tracker][master] CVE-2022-42919/python*: clarify notes

Sylvain Beucler (@beuc) beuc at debian.org
Thu Nov 3 11:48:22 GMT 2022



Sylvain Beucler pushed to branch master at Debian Security Tracker / security-tracker


Commits:
462d2059 by Sylvain Beucler at 2022-11-03T12:48:05+01:00
CVE-2022-42919/python*: clarify notes

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -6310,15 +6310,15 @@ CVE-2022-42919 [Linux specific local privilege escalation via the multiprocessin
 	- python3.10 <unfixed>
 	- python3.9 <unfixed>
 	- python3.7 <removed>
-	[buster] - python3.7 <not-affected> (Vulnerable functionality introduced later)
+	[buster] - python3.7 <not-affected> (Vulnerable functionality backported later in 3.7.8)
 	NOTE: https://github.com/python/cpython/issues/97514
 	NOTE: https://github.com/python/cpython/commit/4686d77a04570a663164c03193d9def23c89b122 (3.11-branch)
 	NOTE: https://github.com/python/cpython/commit/eae692eed18892309bcc25a2c0f8980038305ea2 (3.10-branch)
 	NOTE: https://github.com/python/cpython/commit/b43496c01a554cf41ae654a0379efae18609ad39 (3.9-branch)
 	NOTE: The patch for 3.9 and later only removes the default preference for abstract sockets which
 	NOTE: prevents CVE-2022-42919. Versions 3.8.4 and 3.7.8 are not vulnerable by default (but issue present)
-	NOTE: though users need to manually users would need to make specific uncommon multiprocessing API calls
-	NOTE: specifying their own forkserver control socket path.
+	NOTE: though users would need to make specific uncommon multiprocessing API calls specifying their own
+	NOTE: forkserver control socket path. Earlier 3.x versions are not vulnerable.
 CVE-2022-3503 (A vulnerability was found in SourceCodester Purchase Order Management  ...)
 	NOT-FOR-US: SourceCodester
 CVE-2022-3502 (A vulnerability was found in Human Resource Management System 1.0. It  ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/462d20593fda70e3cb63031de0edbd3acd697115

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/462d20593fda70e3cb63031de0edbd3acd697115
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221103/3963b7bf/attachment.htm>


More information about the debian-security-tracker-commits mailing list