-
CVE-2025-40278
- EPSS 0.09%
- Veröffentlicht 06.12.2025 21:51:01
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak
In the Linux kernel, the following vulnerability has been resolved: net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak Fix a KMSAN kernel-infoleak detected by the syzbot . [net?] KMSAN: kernel-infoleak in __skb_datagram_iter In tcf_ife_dump(), the variable 'opt' was partially initialized using a designatied initializer. While the padding bytes are reamined uninitialized. nla_put() copies the entire structure into a netlink message, these uninitialized bytes leaked to userspace. Initialize the structure with memset before assigning its fields to ensure all members and padding are cleared prior to beign copied. This change silences the KMSAN report and prevents potential information leaks from the kernel memory. This fix has been tested and validated by syzbot. This patch closes the bug reported at the following syzkaller link and ensures no infoleak.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version
ef6980b6becb1afd9d82a4f043749a10ae81bf14
Version <
918e063304f945fb93be9bb70cacea07d0b730ea
Status
affected
Version
ef6980b6becb1afd9d82a4f043749a10ae81bf14
Version <
5e3644ef147bf7140259dfa4cace680c9b26fe8b
Status
affected
Version
ef6980b6becb1afd9d82a4f043749a10ae81bf14
Version <
37f0680887c5aeba9a433fe04b35169010568bb1
Status
affected
Version
ef6980b6becb1afd9d82a4f043749a10ae81bf14
Version <
2191662058443e0bcc28d11694293d8339af6dde
Status
affected
Version
ef6980b6becb1afd9d82a4f043749a10ae81bf14
Version <
a676a296af65d33725bdf7396803180957dbd92e
Status
affected
Version
ef6980b6becb1afd9d82a4f043749a10ae81bf14
Version <
d1dbbbe839647486c9b893e5011fe84a052962df
Status
affected
Version
ef6980b6becb1afd9d82a4f043749a10ae81bf14
Version <
c8f51dad94cbb88054e2aacc272b3ce1ed11fb1e
Status
affected
Version
ef6980b6becb1afd9d82a4f043749a10ae81bf14
Version <
ce50039be49eea9b4cd8873ca6eccded1b4a130a
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.6
Status
affected
Version
0
Version <
4.6
Status
unaffected
Version <=
5.4.*
Version
5.4.302
Status
unaffected
Version <=
5.10.*
Version
5.10.247
Status
unaffected
Version <=
5.15.*
Version
5.15.197
Status
unaffected
Version <=
6.1.*
Version
6.1.159
Status
unaffected
Version <=
6.6.*
Version
6.6.117
Status
unaffected
Version <=
6.12.*
Version
6.12.59
Status
unaffected
Version <=
6.17.*
Version
6.17.9
Status
unaffected
Version <=
*
Version
6.18
Status
unaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.09% | 0.261 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|