CVE-2025-38611

medium

Description

In the Linux kernel, the following vulnerability has been resolved: vmci: Prevent the dispatching of uninitialized payloads The reproducer executes the host's unlocked_ioctl call in two different tasks. When init_context fails, the struct vmci_event_ctx is not fully initialized when executing vmci_datagram_dispatch() to send events to all vm contexts. This affects the datagram taken from the datagram queue of its context by another task, because the datagram payload is not initialized according to the size payload_size, which causes the kernel data to leak to the user space. Before dispatching the datagram, and before setting the payload content, explicitly set the payload content to 0 to avoid data leakage caused by incomplete payload initialization.

References

https://git.kernel.org/stable/c/bfd6b211fe8aae79acbedd19e8d5bea5d062a41b

https://git.kernel.org/stable/c/bfb4cf9fb97e4063f0aa62e9e398025fb6625031

https://git.kernel.org/stable/c/94112b0d443e0b6b5bb17854f97c1498064cc9ed

https://git.kernel.org/stable/c/87f8f8654e55cf9327cc63746595085a041699dc

https://git.kernel.org/stable/c/7624fe66a0832eb6fe4e465fcdd4f9104fb9b339

https://git.kernel.org/stable/c/6696a46f4ebdc7314ff23a2fb0e93a95da2c45ee

Details

Source: Mitre, NVD

Published: 2025-08-19

Updated: 2025-08-20

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:N/A:N

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Severity: Medium

EPSS

EPSS: 0.00024