Updated: 2026-02-08 02:27:39.162843
Description:
In the Linux kernel, the following vulnerability has been resolved: net: fix information leakage in /proc/net/ptype In one net namespace, after creating a packet socket without binding it to a device, users in other net namespaces can observe the new `packet_type` added by this packet socket by reading `/proc/net/ptype` file. This is minor information leakage as packet socket is namespace aware. Add a net pointer in `packet_type` to keep the net namespace of of corresponding packet socket. In `ptype_seq_show`, this net pointer must be checked when it is not NULL.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | 0.0 | |
| CVSS Version 3.x | HIGH | 7.1 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| RHEL 7 ELS | kernel | 3.10.0 | 7.1 | HIGH | Released | CLSA-2025:1759432250 | 2025-10-02 23:04:36 | |
| Ubuntu 16.04 ELS | linux-hwe | 4.15.0 | 7.1 | HIGH | Already Fixed | 2025-10-30 14:42:23 | ||
| Ubuntu 16.04 ELS | linux | 4.4.0 | 7.1 | HIGH | Released | CLSA-2025:1763991095 | 2025-11-24 17:21:28 |