Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 878385 (CVE-2022-42919) - <dev-lang/python-{3.9.15,3.10.8}_p1 <dev-python/pypy3-7.3.9_p7: local privilege escalation via the multiprocessing forkserver start method
Summary: <dev-lang/python-{3.9.15,3.10.8}_p1 <dev-python/pypy3-7.3.9_p7: local privile...
Status: IN_PROGRESS
Alias: CVE-2022-42919
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://github.com/python/cpython/iss...
Whiteboard: A3 [glsa]
Keywords:
Depends on: 878379 878381 878383 878643
Blocks:
  Show dependency tree
 
Reported: 2022-10-26 15:59 UTC by Michał Górny
Modified: 2022-11-19 01:15 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Michał Górny archtester Gentoo Infrastructure gentoo-dev Security 2022-10-26 15:59:04 UTC
I don't see a CVE or even a proper bugref but it's listed in 'Security' category of news.


commit 49f61068f49747164988ffc5a442d2a63874fc17
Author:     Gregory P. Smith <greg@krypto.org>
AuthorDate: 2022-10-21 00:30:09 +0200
Commit:     GitHub <noreply@github.com>
CommitDate: 2022-10-21 00:30:09 +0200

    gh-97514: Don't use Linux abstract sockets for multiprocessing (#98501)
    
    Linux abstract sockets are insecure as they lack any form of filesystem
    permissions so their use allows anyone on the system to inject code into
    the process.
    
    This removes the default preference for abstract sockets in
    multiprocessing introduced in Python 3.9+ via
    https://github.com/python/cpython/pull/18866 while fixing
    https://github.com/python/cpython/issues/84031.
    
    Explicit use of an abstract socket by a user now generates a
    RuntimeWarning.  If we choose to keep this warning, it should be
    backported to the 3.7 and 3.8 branches.
Comment 1 Michał Górny archtester Gentoo Infrastructure gentoo-dev Security 2022-10-29 06:01:31 UTC
cleanup done
Comment 2 Michał Górny archtester Gentoo Infrastructure gentoo-dev Security 2022-10-29 06:03:23 UTC
Hmm, pypy3 is also affected.
Comment 3 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-10-31 03:01:11 UTC
Please cleanup.

Very hard to call this a root privilege escalation without anything apparent to exploit, leaving at 3.
Comment 4 Michał Górny archtester Gentoo Infrastructure gentoo-dev Security 2022-10-31 13:56:12 UTC
pypy3 cleanup done too.
Comment 5 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-11-19 01:15:58 UTC
GLSA requested