Impact
The Linux kernel previously allowed namespace‑iteration ioctl calls to expose the names of other privileged services’ namespaces. The patch tightens permission checks, preventing privileged services from inadvertently seeing or inferring information about namespaces belonging to other privileged processes. This change reduces the risk of metadata leakage that could aid in further local attacks. The vulnerability is an example of improper access control that can be used to obtain unintended information.
Affected Systems
All Linux kernel builds prior to the inclusion of the patch are affected. The patch is included in recent kernel releases; no specific version range was provided in the advisory.
Risk and Exploitability
The CVSS score of 7.0 indicates high severity. The EPSS score is not available, and it is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is local and would require the attacker to run privileged code that can issue the namespace‑iteration ioctls. Because the vulnerability exists only for privileged services and the fix is a permission check, exploitation is non‑trivial and likely limited to scenarios where the attacker can activate or modify privileged services.
OpenCVE Enrichment