CVE-2022-42919
NixOS vulnerability analysis and mitigation

Overview

The Python multiprocessing library vulnerability (CVE-2022-42919) was discovered by Devin Jeanpierre of Google and affects Python versions 3.9.x before 3.9.16 and 3.10.x before 3.10.9 on Linux systems. The vulnerability exists when using the forkserver start method, which is not the default configuration. This Linux-specific issue was disclosed in September 2022 (Python Issue).

Technical details

The vulnerability occurs when the Python multiprocessing library is used with the forkserver start method on Linux. The issue allows pickles to be deserialized from any user in the same machine local network namespace, which in many system configurations means any user on the same machine. Since pickles can execute arbitrary code, this creates a security risk. The vulnerability has a CVSS score of 7.8 (High) with the vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

Successful exploitation of this vulnerability could lead to local privilege escalation, allowing attackers to execute arbitrary code with the privileges of the user running the forkserver process. This could result in disclosure of sensitive information, addition or modification of data, or Denial of Service (DoS) (NetApp Security).

Mitigation and workarounds

A workaround is available by setting multiprocessing.util.abstractsocketssupported to False before any multiprocessing usage. Alternatively, applications can switch from using the forkserver start method to using the 'spawn' start method. The permanent fix involves updating to Python versions 3.9.16, 3.10.9, or later which remove the default preference for abstract sockets (Python Issue).

Community reactions

Multiple Linux distributions and software vendors responded to this vulnerability by releasing security updates. Ubuntu, Fedora, and other distributions pushed security patches to address the issue. The vulnerability was considered significant enough to warrant immediate attention from major platform providers (Ubuntu Security).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management