First published: Thu Jun 20 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: net: fix information leakage in /proc/net/ptype In one net namespace, after creating a packet socket without binding it to a device, users in other net namespaces can observe the new `packet_type` added by this packet socket by reading `/proc/net/ptype` file. This is minor information leakage as packet socket is namespace aware. Add a net pointer in `packet_type` to keep the net namespace of of corresponding packet socket. In `ptype_seq_show`, this net pointer must be checked when it is not NULL.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <4.4.302 | 4.4.302 |
redhat/kernel | <4.9.300 | 4.9.300 |
redhat/kernel | <4.14.265 | 4.14.265 |
redhat/kernel | <4.19.228 | 4.19.228 |
redhat/kernel | <5.4.176 | 5.4.176 |
redhat/kernel | <5.10.96 | 5.10.96 |
redhat/kernel | <5.15.19 | 5.15.19 |
redhat/kernel | <5.16.5 | 5.16.5 |
redhat/kernel | <5.17 | 5.17 |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-48757 is classified as a low severity vulnerability due to information leakage in net namespaces.
To mitigate CVE-2022-48757, you should update to the latest kernel versions specified such as 4.4.302, 4.9.300, 4.14.265, 4.19.228, 5.4.176, 5.10.96, 5.15.19, 5.16.5, or 5.17.
CVE-2022-48757 affects specific versions of the Linux kernel in various distributions, including Red Hat versions listed in the vulnerability details.
The impact of CVE-2022-48757 allows users in one net namespace to observe packet types from another net namespace, potentially leading to unintended information disclosure.
As of now, there are no publicly known exploits specifically targeting CVE-2022-48757.