In the Linux kernel, the following vulnerability has been...
High severity
Unreviewed
Published
Aug 21, 2024
to the GitHub Advisory Database
•
Updated Sep 3, 2024
Description
Published by the National Vulnerability Database
Aug 21, 2024
Published to the GitHub Advisory Database
Aug 21, 2024
Last updated
Sep 3, 2024
In the Linux kernel, the following vulnerability has been resolved:
vhost/vsock: always initialize seqpacket_allow
There are two issues around seqpacket_allow:
created. Thus if features are never set, it will be
read uninitialized.
then seqpacket_allow will not be cleared appropriately
(existing apps I know about don't usually do this but
it's legal and there's no way to be sure no one relies
on this).
To fix:
- initialize seqpacket_allow after allocation
- set it unconditionally in set_features
References