CVE-2022-48757

HIGH

Linux Kernel < 4.4.302 - Exposure to Wrong Actor

Title source: rule

Description

In the Linux kernel, the following vulnerability has been resolved: net: fix information leakage in /proc/net/ptype In one net namespace, after creating a packet socket without binding it to a device, users in other net namespaces can observe the new `packet_type` added by this packet socket by reading `/proc/net/ptype` file. This is minor information leakage as packet socket is namespace aware. Add a net pointer in `packet_type` to keep the net namespace of of corresponding packet socket. In `ptype_seq_show`, this net pointer must be checked when it is not NULL.

Scores

CVSS v3 7.1
EPSS 0.0001
EPSS Percentile 1.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

Classification

CWE
CWE-668
Status published

Affected Products (10)

linux/linux_kernel < 4.4.302
linux/linux_kernel
linux/Kernel < 4.4.302linux
linux/Kernel < 4.9.300linux
linux/Kernel < 4.14.265linux
linux/Kernel < 4.19.228linux
linux/Kernel < 5.4.176linux
linux/Kernel < 5.10.96linux
linux/Kernel < 5.15.19linux
linux/Kernel < 5.16.5linux

Timeline

Published Jun 20, 2024
Tracked Since Feb 18, 2026