CVE-2022-48757

Updated: 2024-08-13 01:46:53.477476

Description:

In the Linux kernel, the following vulnerability has been resolved: net: fix information leakage in /proc/net/ptype In one net namespace, after creating a packet socket without binding it to a device, users in other net namespaces can observe the new `packet_type` added by this packet socket by reading `/proc/net/ptype` file. This is minor information leakage as packet socket is namespace aware. Add a net pointer in `packet_type` to keep the net namespace of of corresponding packet socket. In `ptype_seq_show`, this net pointer must be checked when it is not NULL.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x NONE 0
CVSS Version 3.x LOW 3.3000000000000003

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 3.3 LOW Ignored 2024-08-13 14:26:34
CentOS 6 ELS kernel 2.6.32 3.3 LOW Ignored 2024-08-13 14:26:34
CentOS 7 ELS kernel 3.10.0 3.3 LOW Ignored 2024-08-13 14:26:33
CentOS 8.4 ELS kernel 4.18.0 3.3 LOW Released CLSA-2024:1725872696 2024-09-09 05:25:34
CentOS 8.5 ELS kernel 4.18.0 3.3 LOW Released CLSA-2024:1725876080 2024-09-09 12:15:40
CentOS Stream 8 ELS kernel 4.18.0 3.3 LOW Ignored 2024-10-09 03:51:45
CloudLinux 6 ELS kernel 2.6.32 3.3 LOW Ignored 2024-08-13 14:26:34
CloudLinux 7 ELS kernel 3.10.0 3.3 LOW Ignored 2024-08-13 14:26:33
Oracle Linux 6 ELS kernel 2.6.32 3.3 LOW Ignored 2024-08-13 14:26:33