CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
5.1%
In the Linux kernel, the following vulnerability has been resolved:
vhost/vsock: always initialize seqpacket_allow
There are two issues around seqpacket_allow:
To fix:
- initialize seqpacket_allow after allocation
- set it unconditionally in set_features
Vendor | Product | Version | CPE |
---|---|---|---|
linux | linux_kernel | * | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
git.kernel.org/stable/c/1e1fdcbdde3b7663e5d8faeb2245b9b151417d22
git.kernel.org/stable/c/3062cb100787a9ddf45de30004b962035cd497fb
git.kernel.org/stable/c/30bd4593669443ac58515e23557dc8cef70d8582
git.kernel.org/stable/c/ea558f10fb05a6503c6e655a1b7d81fdf8e5924c
git.kernel.org/stable/c/eab96e8716cbfc2834b54f71cc9501ad4eec963b