First published: Sun Nov 06 2022(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/pypy3 | <=7.3.5+dfsg-2+deb11u2<=7.3.5+dfsg-2+deb11u4 | 7.3.11+dfsg-2+deb12u3 7.3.17+dfsg-3 |
debian/python2.7 | 2.7.18-8+deb11u1 | |
debian/python3.11 | 3.11.2-6+deb12u5 3.11.2-6+deb12u3 | |
debian/python3.9 | <=3.9.2-1 | 3.9.2-1+deb11u2 |
Python Programming Language | >=3.7.3<=3.7.15 | |
Python Programming Language | >=3.8.3<=3.8.15 | |
Python Programming Language | >=3.9.0<3.9.16 | |
Python Programming Language | >=3.10.0<3.10.9 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2022-42919.
The severity of CVE-2022-42919 is high (7.8).
Python versions 3.9.x before 3.9.16 and 3.10.x before 3.10.9 on Linux are affected by CVE-2022-42919.
CVE-2022-42919 allows local privilege escalation in a non-default configuration on Linux.
To fix CVE-2022-42919, upgrade your Python installation to version 3.9.16 or 3.10.9.