In the Linux kernel, the following vulnerability has been resolved:
net: fix information leakage in /proc/net/ptype
In one net namespace, after creating a packet socket without binding
it to a device, users in other net namespaces can observe the new
packet_type added by this packet socket by reading /proc/net/ptype
file. This is minor information leakage as packet socket is
namespace aware.
Add a net pointer in packet_type to keep the net namespace of
of corresponding packet socket. In ptype_seq_show, this net pointer
must be checked when it is not NULL.
[
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c38023032a598ec6263e008d62c7f02def72d5c7",
"signature_type": "Line",
"target": {
"file": "include/linux/netdevice.h"
},
"id": "CVE-2022-48757-13f30076",
"digest": {
"line_hashes": [
"338441853476192697612890226010485007510",
"119807959662828460544661115660630768904",
"61110548520289777364246371909572229339",
"332213343448735750633644385540580838213"
],
"threshold": 0.9
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e43669c77cb3a742b7d84ecdc7c68c4167a7709b",
"signature_type": "Function",
"target": {
"function": "fanout_add",
"file": "net/packet/af_packet.c"
},
"id": "CVE-2022-48757-43974558",
"digest": {
"length": 2976.0,
"function_hash": "59210561863842393422459286048576933414"
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c38023032a598ec6263e008d62c7f02def72d5c7",
"signature_type": "Function",
"target": {
"function": "packet_create",
"file": "net/packet/af_packet.c"
},
"id": "CVE-2022-48757-4a383709",
"digest": {
"length": 1504.0,
"function_hash": "270096672164060856649169204365099240155"
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@be1ca30331c7923c6f376610c1bd6059be9b1908",
"signature_type": "Line",
"target": {
"file": "include/linux/netdevice.h"
},
"id": "CVE-2022-48757-542ebaad",
"digest": {
"line_hashes": [
"338441853476192697612890226010485007510",
"119807959662828460544661115660630768904",
"61110548520289777364246371909572229339",
"332213343448735750633644385540580838213"
],
"threshold": 0.9
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c38023032a598ec6263e008d62c7f02def72d5c7",
"signature_type": "Function",
"target": {
"function": "fanout_add",
"file": "net/packet/af_packet.c"
},
"id": "CVE-2022-48757-57ce9453",
"digest": {
"length": 2631.0,
"function_hash": "212174084757673365319276451984905802702"
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c38023032a598ec6263e008d62c7f02def72d5c7",
"signature_type": "Line",
"target": {
"file": "net/core/net-procfs.c"
},
"id": "CVE-2022-48757-5dbb7324",
"digest": {
"line_hashes": [
"40547771324224515397910115802393184671",
"178313819378831180795665523312351375731",
"267378736933852068188283803358775910724",
"72332305177266623599086382289571784413"
],
"threshold": 0.9
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@be1ca30331c7923c6f376610c1bd6059be9b1908",
"signature_type": "Function",
"target": {
"function": "ptype_seq_show",
"file": "net/core/net-procfs.c"
},
"id": "CVE-2022-48757-6837425f",
"digest": {
"length": 488.0,
"function_hash": "309312775440385595561592319162786758213"
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e43669c77cb3a742b7d84ecdc7c68c4167a7709b",
"signature_type": "Line",
"target": {
"file": "net/packet/af_packet.c"
},
"id": "CVE-2022-48757-714e5977",
"digest": {
"line_hashes": [
"14901963993408960022107243506678833908",
"114132924834171859701478726338508036660",
"179985296094684713460987616291298565323",
"187559457897023111334537822133056914962",
"148458972087938432896443179380496034586",
"45552359411249557904600214552387581190",
"139708668606564447809281715090865091008",
"95514396021507078571155169585073429501"
],
"threshold": 0.9
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c38023032a598ec6263e008d62c7f02def72d5c7",
"signature_type": "Line",
"target": {
"file": "net/packet/af_packet.c"
},
"id": "CVE-2022-48757-7a1b8458",
"digest": {
"line_hashes": [
"14901963993408960022107243506678833908",
"114132924834171859701478726338508036660",
"43731605557420561779397426229973923198",
"313415882638766082385333381612145976115",
"148458972087938432896443179380496034586",
"45552359411249557904600214552387581190",
"139708668606564447809281715090865091008",
"95514396021507078571155169585073429501"
],
"threshold": 0.9
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c38023032a598ec6263e008d62c7f02def72d5c7",
"signature_type": "Function",
"target": {
"function": "ptype_seq_show",
"file": "net/core/net-procfs.c"
},
"id": "CVE-2022-48757-8c8e3518",
"digest": {
"length": 488.0,
"function_hash": "309312775440385595561592319162786758213"
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@be1ca30331c7923c6f376610c1bd6059be9b1908",
"signature_type": "Line",
"target": {
"file": "net/core/net-procfs.c"
},
"id": "CVE-2022-48757-aaa88a96",
"digest": {
"line_hashes": [
"40547771324224515397910115802393184671",
"178313819378831180795665523312351375731",
"267378736933852068188283803358775910724",
"72332305177266623599086382289571784413"
],
"threshold": 0.9
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e43669c77cb3a742b7d84ecdc7c68c4167a7709b",
"signature_type": "Line",
"target": {
"file": "include/linux/netdevice.h"
},
"id": "CVE-2022-48757-ac73d6e1",
"digest": {
"line_hashes": [
"338441853476192697612890226010485007510",
"119807959662828460544661115660630768904",
"61110548520289777364246371909572229339",
"332213343448735750633644385540580838213"
],
"threshold": 0.9
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e43669c77cb3a742b7d84ecdc7c68c4167a7709b",
"signature_type": "Function",
"target": {
"function": "ptype_seq_show",
"file": "net/core/net-procfs.c"
},
"id": "CVE-2022-48757-c985c4b6",
"digest": {
"length": 488.0,
"function_hash": "313361540830920486671253947312927033413"
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e43669c77cb3a742b7d84ecdc7c68c4167a7709b",
"signature_type": "Line",
"target": {
"file": "net/core/net-procfs.c"
},
"id": "CVE-2022-48757-ce4e43e6",
"digest": {
"line_hashes": [
"40547771324224515397910115802393184671",
"178313819378831180795665523312351375731",
"267378736933852068188283803358775910724",
"72332305177266623599086382289571784413"
],
"threshold": 0.9
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e43669c77cb3a742b7d84ecdc7c68c4167a7709b",
"signature_type": "Function",
"target": {
"function": "packet_create",
"file": "net/packet/af_packet.c"
},
"id": "CVE-2022-48757-ceaa361a",
"digest": {
"length": 1504.0,
"function_hash": "270096672164060856649169204365099240155"
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@be1ca30331c7923c6f376610c1bd6059be9b1908",
"signature_type": "Line",
"target": {
"file": "net/packet/af_packet.c"
},
"id": "CVE-2022-48757-d66d9780",
"digest": {
"line_hashes": [
"14901963993408960022107243506678833908",
"114132924834171859701478726338508036660",
"43731605557420561779397426229973923198",
"313415882638766082385333381612145976115",
"148458972087938432896443179380496034586",
"45552359411249557904600214552387581190",
"139708668606564447809281715090865091008",
"95514396021507078571155169585073429501"
],
"threshold": 0.9
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@be1ca30331c7923c6f376610c1bd6059be9b1908",
"signature_type": "Function",
"target": {
"function": "fanout_add",
"file": "net/packet/af_packet.c"
},
"id": "CVE-2022-48757-e7c6a47a",
"digest": {
"length": 2381.0,
"function_hash": "110589911124612512686954815397433087783"
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@be1ca30331c7923c6f376610c1bd6059be9b1908",
"signature_type": "Function",
"target": {
"function": "packet_create",
"file": "net/packet/af_packet.c"
},
"id": "CVE-2022-48757-fb3f4f90",
"digest": {
"length": 1504.0,
"function_hash": "270096672164060856649169204365099240155"
},
"deprecated": false
}
]