pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=bcd0f93353326954817a4f9fa55ec57fb38acbb0 | patch vendor advisory |
https://github.com/torvalds/linux/commit/bcd0f93353326954817a4f9fa55ec57fb38acbb0 | third party advisory patch |
https://www.debian.org/security/2022/dsa-5050 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html | third party advisory mailing list |
https://www.debian.org/security/2022/dsa-5096 | third party advisory vendor advisory |