CVE-2025-40279
BaseFortify
Publication date: 2025-12-06
Last updated on: 2025-12-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the act_connmark module where a structure (tc_ife) was only partially initialized. Because some padding bytes remained uninitialized, when the structure was copied into a netlink message, these uninitialized bytes leaked kernel memory contents to userspace. The fix was to fully initialize the structure with memset before setting its fields to prevent leaking uninitialized data.
How can this vulnerability impact me? :
This vulnerability can lead to unintended leakage of kernel memory contents to userspace, potentially exposing sensitive information or internal kernel data that should remain protected. This could be exploited by an attacker to gain insights into the kernel memory layout or sensitive data, which might aid further attacks.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch or update to the fixed Linux kernel version that initializes the struct tc_ife properly to prevent kernel memory leaks. Until then, avoid exposing vulnerable kernel interfaces to untrusted userspace processes.