CVE-2025-40278
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-12-06

Last updated on: 2025-12-08

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak Fix a KMSAN kernel-infoleak detected by the syzbot . [net?] KMSAN: kernel-infoleak in __skb_datagram_iter In tcf_ife_dump(), the variable 'opt' was partially initialized using a designatied initializer. While the padding bytes are reamined uninitialized. nla_put() copies the entire structure into a netlink message, these uninitialized bytes leaked to userspace. Initialize the structure with memset before assigning its fields to ensure all members and padding are cleared prior to beign copied. This change silences the KMSAN report and prevents potential information leaks from the kernel memory. This fix has been tested and validated by syzbot. This patch closes the bug reported at the following syzkaller link and ensures no infoleak.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-06
Last Modified
2025-12-08
Generated
2026-05-07
AI Q&A
2025-12-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a kernel information leak in the Linux kernel related to the net scheduler's act_ife module. Specifically, a structure (tc_ife) was only partially initialized, leaving some padding bytes uninitialized. When this structure was copied into a netlink message, these uninitialized bytes leaked kernel memory contents to userspace, potentially exposing sensitive information. The issue was detected by KMSAN (Kernel Memory Sanitizer) and fixed by fully initializing the structure with memset before use.


How can this vulnerability impact me? :

This vulnerability can lead to leakage of kernel memory contents to userspace, which may expose sensitive or confidential information from the kernel memory. Such information leaks can be exploited by attackers to gain insights into the system's internal state, potentially aiding further attacks or compromising system security.


What immediate steps should I take to mitigate this vulnerability?

Apply the patch that initializes the struct tc_ife with memset before assigning its fields, as described in the fix for this vulnerability. This prevents kernel memory information leaks by ensuring all members and padding bytes are cleared prior to being copied. The fix has been tested and validated by syzbot.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart