CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
In the Linux kernel, the following vulnerability has been resolved:
vhost/vsock: always initialize seqpacket_allow
There are two issues around seqpacket_allow:
To fix:
- initialize seqpacket_allow after allocation
- set it unconditionally in set_features
git.kernel.org/stable/c/1e1fdcbdde3b7663e5d8faeb2245b9b151417d22
git.kernel.org/stable/c/3062cb100787a9ddf45de30004b962035cd497fb
git.kernel.org/stable/c/30bd4593669443ac58515e23557dc8cef70d8582
git.kernel.org/stable/c/ea558f10fb05a6503c6e655a1b7d81fdf8e5924c
git.kernel.org/stable/c/eab96e8716cbfc2834b54f71cc9501ad4eec963b
security-tracker.debian.org/tracker/CVE-2024-43873