Updated: 2024-08-13 01:46:53.477476
Description:
In the Linux kernel, the following vulnerability has been resolved: net: fix information leakage in /proc/net/ptype In one net namespace, after creating a packet socket without binding it to a device, users in other net namespaces can observe the new `packet_type` added by this packet socket by reading `/proc/net/ptype` file. This is minor information leakage as packet socket is namespace aware. Add a net pointer in `packet_type` to keep the net namespace of of corresponding packet socket. In `ptype_seq_show`, this net pointer must be checked when it is not NULL.
Links | NIST | CIRCL | RHEL | Ubuntu |
Severity | Score | |
---|---|---|
CVSS Version 2.x | NONE | 0 |
CVSS Version 3.x | LOW | 3.3000000000000003 |
OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
---|---|---|---|---|---|---|---|---|
AlmaLinux 9.2 ESU | kernel | 5.14.0 | 3.3 | LOW | Ignored | 2024-08-13 14:26:34 | ||
CentOS 6 ELS | kernel | 2.6.32 | 3.3 | LOW | Ignored | 2024-08-13 14:26:34 | ||
CentOS 7 ELS | kernel | 3.10.0 | 3.3 | LOW | Ignored | 2024-08-13 14:26:33 | ||
CentOS 8.4 ELS | kernel | 4.18.0 | 3.3 | LOW | Released | CLSA-2024:1725872696 | 2024-09-09 05:25:34 | |
CentOS 8.5 ELS | kernel | 4.18.0 | 3.3 | LOW | Released | CLSA-2024:1725876080 | 2024-09-09 12:15:40 | |
CentOS Stream 8 ELS | kernel | 4.18.0 | 3.3 | LOW | Ignored | 2024-10-09 03:51:45 | ||
CloudLinux 6 ELS | kernel | 2.6.32 | 3.3 | LOW | Ignored | 2024-08-13 14:26:34 | ||
CloudLinux 7 ELS | kernel | 3.10.0 | 3.3 | LOW | Ignored | 2024-08-13 14:26:33 | ||
Oracle Linux 6 ELS | kernel | 2.6.32 | 3.3 | LOW | Ignored | 2024-08-13 14:26:33 |