CVE-2022-48757
HIGHLinux Kernel < 4.4.302 - Exposure to Wrong Actor
Title source: ruleDescription
In the Linux kernel, the following vulnerability has been resolved: net: fix information leakage in /proc/net/ptype In one net namespace, after creating a packet socket without binding it to a device, users in other net namespaces can observe the new `packet_type` added by this packet socket by reading `/proc/net/ptype` file. This is minor information leakage as packet socket is namespace aware. Add a net pointer in `packet_type` to keep the net namespace of of corresponding packet socket. In `ptype_seq_show`, this net pointer must be checked when it is not NULL.
References (9)
Scores
CVSS v3
7.1
EPSS
0.0001
EPSS Percentile
1.8%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Classification
CWE
CWE-668
Status
published
Affected Products (10)
linux/linux_kernel
< 4.4.302
linux/linux_kernel
linux/Kernel
< 4.4.302linux
linux/Kernel
< 4.9.300linux
linux/Kernel
< 4.14.265linux
linux/Kernel
< 4.19.228linux
linux/Kernel
< 5.4.176linux
linux/Kernel
< 5.10.96linux
linux/Kernel
< 5.15.19linux
linux/Kernel
< 5.16.5linux
Timeline
Published
Jun 20, 2024
Tracked Since
Feb 18, 2026