CVE-2025-40278
Description
In the Linux kernel, the following vulnerability has been resolved:
net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak
Fix a KMSAN kernel-infoleak detected by the syzbot .
[net?] KMSAN: kernel-infoleak in __skb_datagram_iter
In tcf_ife_dump(), the variable 'opt' was partially initialized using a designatied initializer. While the padding bytes are reamined uninitialized. nla_put() copies the entire structure into a netlink message, these uninitialized bytes leaked to userspace.
Initialize the structure with memset before assigning its fields to ensure all members and padding are cleared prior to beign copied.
This change silences the KMSAN report and prevents potential information leaks from the kernel memory.
This fix has been tested and validated by syzbot. This patch closes the bug reported at the following syzkaller link and ensures no infoleak.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A kernel information leak in the Linux net/sched act_ife module occurs because the tc_ife struct is not fully initialized before being copied to userspace via netlink.
Vulnerability
In the Linux kernel's net/sched act_ife module, the function tcf_ife_dump() uses a designated initializer for the local variable opt of type struct tc_ife. This leaves padding bytes within the structure uninitialized. When nla_put() copies the entire structure into a netlink message, those uninitialized bytes are sent to userspace, resulting in a kernel information leak (infoleak). The issue was detected by the syzbot fuzzer using the Kernel Memory Sanitizer (KMSAN), which reported the leak as a KMSAN warning [1].
Exploitation
An attacker with the ability to trigger the dumping of an IFE action (e.g., via netlink operations such as tc actions show) can exploit this vulnerability. No special privileges beyond the ability to send netlink messages are required, as the leak occurs during a standard dump operation. The uninitialized kernel stack memory is copied into a netlink message, which is then transmitted to the requesting userspace process [1].
Impact
Successful exploitation allows an attacker to read uninitialized kernel stack memory, potentially leaking sensitive information such as kernel pointers, stack canaries, or other data that could be used to bypass kernel security mechanisms (e.g., KASLR). This is a confidentiality-only issue; it does not directly allow code execution or privilege escalation, but the leaked information may aid in further attacks [1].
Mitigation
The fix, committed to the Linux kernel stable tree, adds a memset() call to zero-initialize the entire struct tc_ife before assigning its fields. This ensures all padding bytes are cleared before the structure is copied to userspace. The patch has been validated by syzbot and is available in the stable kernel branches [1][2][3]. Users should apply the latest kernel updates from their distribution to remediate this vulnerability.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
8918e063304f95e3644ef147b37f0680887c5219166205844a676a296af65d1dbbbe83964c8f51dad94cbce50039be49eVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/2191662058443e0bcc28d11694293d8339af6ddenvd
- git.kernel.org/stable/c/37f0680887c5aeba9a433fe04b35169010568bb1nvd
- git.kernel.org/stable/c/5e3644ef147bf7140259dfa4cace680c9b26fe8bnvd
- git.kernel.org/stable/c/918e063304f945fb93be9bb70cacea07d0b730eanvd
- git.kernel.org/stable/c/a676a296af65d33725bdf7396803180957dbd92envd
- git.kernel.org/stable/c/c8f51dad94cbb88054e2aacc272b3ce1ed11fb1envd
- git.kernel.org/stable/c/ce50039be49eea9b4cd8873ca6eccded1b4a130anvd
- git.kernel.org/stable/c/d1dbbbe839647486c9b893e5011fe84a052962dfnvd
News mentions
0No linked articles in our index yet.