In the Linux kernel, the following vulnerability has been resolved:
vhost/vsock: always initialize seqpacket_allow
There are two issues around seqpacket_allow:
To fix:
- initialize seqpacket_allow after allocation
- set it unconditionally in set_features
git.kernel.org/stable/c/1e1fdcbdde3b7663e5d8faeb2245b9b151417d22
git.kernel.org/stable/c/3062cb100787a9ddf45de30004b962035cd497fb
git.kernel.org/stable/c/30bd4593669443ac58515e23557dc8cef70d8582
git.kernel.org/stable/c/ea558f10fb05a6503c6e655a1b7d81fdf8e5924c
git.kernel.org/stable/c/eab96e8716cbfc2834b54f71cc9501ad4eec963b