Advisory Published
Updated

CVE-2022-48757: net: fix information leakage in /proc/net/ptype

First published: Thu Jun 20 2024(Updated: )

In the Linux kernel, the following vulnerability has been resolved: net: fix information leakage in /proc/net/ptype In one net namespace, after creating a packet socket without binding it to a device, users in other net namespaces can observe the new `packet_type` added by this packet socket by reading `/proc/net/ptype` file. This is minor information leakage as packet socket is namespace aware. Add a net pointer in `packet_type` to keep the net namespace of of corresponding packet socket. In `ptype_seq_show`, this net pointer must be checked when it is not NULL.

Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

Affected SoftwareAffected VersionHow to fix
redhat/kernel<4.4.302
4.4.302
redhat/kernel<4.9.300
4.9.300
redhat/kernel<4.14.265
4.14.265
redhat/kernel<4.19.228
4.19.228
redhat/kernel<5.4.176
5.4.176
redhat/kernel<5.10.96
5.10.96
redhat/kernel<5.15.19
5.15.19
redhat/kernel<5.16.5
5.16.5
redhat/kernel<5.17
5.17
IBM Security Verify Governance - Identity Manager<=ISVG 10.0.2
IBM Security Verify Governance, Identity Manager Software Stack<=ISVG 10.0.2
IBM Security Verify Governance, Identity Manager Virtual Appliance<=ISVG 10.0.2
IBM Security Verify Governance Identity Manager Container<=ISVG 10.0.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the severity of CVE-2022-48757?

    CVE-2022-48757 is classified as a low severity vulnerability due to information leakage in net namespaces.

  • How do I fix CVE-2022-48757?

    To mitigate CVE-2022-48757, you should update to the latest kernel versions specified such as 4.4.302, 4.9.300, 4.14.265, 4.19.228, 5.4.176, 5.10.96, 5.15.19, 5.16.5, or 5.17.

  • What systems are affected by CVE-2022-48757?

    CVE-2022-48757 affects specific versions of the Linux kernel in various distributions, including Red Hat versions listed in the vulnerability details.

  • What impact does CVE-2022-48757 have on system security?

    The impact of CVE-2022-48757 allows users in one net namespace to observe packet types from another net namespace, potentially leading to unintended information disclosure.

  • Is there a known exploit for CVE-2022-48757?

    As of now, there are no publicly known exploits specifically targeting CVE-2022-48757.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203