CVE-2022-48757

Source
https://cve.org/CVERecord?id=CVE-2022-48757
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48757.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48757
Downstream
Published
2024-06-20T11:13:36.529Z
Modified
2026-03-20T12:21:50.662778Z
Summary
net: fix information leakage in /proc/net/ptype
Details

In the Linux kernel, the following vulnerability has been resolved:

net: fix information leakage in /proc/net/ptype

In one net namespace, after creating a packet socket without binding it to a device, users in other net namespaces can observe the new packet_type added by this packet socket by reading /proc/net/ptype file. This is minor information leakage as packet socket is namespace aware.

Add a net pointer in packet_type to keep the net namespace of of corresponding packet socket. In ptype_seq_show, this net pointer must be checked when it is not NULL.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48757.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2feb27dbe00cbb4f7d31f90acf6bd0d751dd0a50
Fixed
8f88c78d24f6f346919007cd459fd7e51a8c7779
Fixed
be1ca30331c7923c6f376610c1bd6059be9b1908
Fixed
c38023032a598ec6263e008d62c7f02def72d5c7
Fixed
b67ad6170c0ea87391bb253f35d1f78857736e54
Fixed
e372ecd455b6ebc7720f52bf4b5f5d44d02f2092
Fixed
db044d97460ea792110eb8b971e82569ded536c6
Fixed
e43669c77cb3a742b7d84ecdc7c68c4167a7709b
Fixed
839ec7039513a4f84bfbaff953a9393471176bee
Fixed
47934e06b65637c88a762d9c98329ae6e3238888

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48757.json"