Overview
About vulnerability
In the Linux kernel, the following vulnerability has been resolved:
net: fix information leakage in /proc/net/ptype
In one net namespace, after creating a packet socket without binding
it to a device, users in other net namespaces can observe the new
packet_type added by this packet socket by reading /proc/net/ptype
file. This is minor information leakage as packet socket is
namespace aware.
Add a net pointer in packet_type to keep the net namespace of
of corresponding packet socket. In ptype_seq_show, this net pointer
must be checked when it is not NULL.
Details
- Affected product:
- AlmaLinux 9.2 ESU , CentOS 6 ELS , CentOS 7 ELS , CentOS 8.4 ELS , CentOS 8.5 ELS , CentOS Stream 8 ELS , CloudLinux 6 ELS , CloudLinux 7 ELS , Oracle Linux 6 ELS , Oracle Linux 7 ELS , RHEL 7 ELS , Ubuntu 16.04 ELS
- Affected packages:
- linux-hwe @ 4.15.0 (+13 more)
In the Linux kernel, the following vulnerability has been resolved:
net: fix information leakage in /proc/net/ptype
In one net namespace, after creating a packet socket without binding
it to a device, users in other net namespaces can observe the new
packet_type added by this packet socket by reading /proc/net/ptype
file. This is minor information leakage as packet socket is
namespace aware.
Add a net pointer in packet_type to keep the net namespace of
of corresponding packet socket. In ptype_seq_show, this net pointer
must be checked when it is not NULL.