In the Linux kernel, the following vulnerability has been resolved: vmci: Prevent the dispatching of uninitialized payloads The reproducer executes the host's unlocked_ioctl call in two different tasks. When init_context fails, the struct vmci_event_ctx is not fully initialized when executing vmci_datagram_dispatch() to send events to all vm contexts. This affects the datagram taken from the datagram queue of its context by another task, because the datagram payload is not initialized according to the size payload_size, which causes the kernel data to leak to the user space. Before dispatching the datagram, and before setting the payload content, explicitly set the payload content to 0 to avoid data leakage caused by incomplete payload initialization.
https://git.kernel.org/stable/c/bfd6b211fe8aae79acbedd19e8d5bea5d062a41b
https://git.kernel.org/stable/c/bfb4cf9fb97e4063f0aa62e9e398025fb6625031
https://git.kernel.org/stable/c/94112b0d443e0b6b5bb17854f97c1498064cc9ed
https://git.kernel.org/stable/c/87f8f8654e55cf9327cc63746595085a041699dc
https://git.kernel.org/stable/c/7624fe66a0832eb6fe4e465fcdd4f9104fb9b339
https://git.kernel.org/stable/c/6696a46f4ebdc7314ff23a2fb0e93a95da2c45ee