Lucene search

K
osvGoogleOSV:CVE-2024-43873
HistoryAug 21, 2024 - 1:15 a.m.

CVE-2024-43873

2024-08-2101:15:11
Google
osv.dev
linux kernel
vhost/vsock
seqpacket_allow
vulnerability
socket
feature setting

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.9

Confidence

Low

In the Linux kernel, the following vulnerability has been resolved:

vhost/vsock: always initialize seqpacket_allow

There are two issues around seqpacket_allow:

  1. seqpacket_allow is not initialized when socket is
    created. Thus if features are never set, it will be
    read uninitialized.
  2. if VIRTIO_VSOCK_F_SEQPACKET is set and then cleared,
    then seqpacket_allow will not be cleared appropriately
    (existing apps I know about don’t usually do this but
    it’s legal and there’s no way to be sure no one relies
    on this).

To fix:
- initialize seqpacket_allow after allocation
- set it unconditionally in set_features

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.9

Confidence

Low