VYPR
Unrated severityNVD Advisory· Published Dec 6, 2025· Updated Apr 15, 2026

CVE-2025-40278

CVE-2025-40278

Description

In the Linux kernel, the following vulnerability has been resolved:

net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak

Fix a KMSAN kernel-infoleak detected by the syzbot .

[net?] KMSAN: kernel-infoleak in __skb_datagram_iter

In tcf_ife_dump(), the variable 'opt' was partially initialized using a designatied initializer. While the padding bytes are reamined uninitialized. nla_put() copies the entire structure into a netlink message, these uninitialized bytes leaked to userspace.

Initialize the structure with memset before assigning its fields to ensure all members and padding are cleared prior to beign copied.

This change silences the KMSAN report and prevents potential information leaks from the kernel memory.

This fix has been tested and validated by syzbot. This patch closes the bug reported at the following syzkaller link and ensures no infoleak.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A kernel information leak in the Linux net/sched act_ife module occurs because the tc_ife struct is not fully initialized before being copied to userspace via netlink.

Vulnerability

In the Linux kernel's net/sched act_ife module, the function tcf_ife_dump() uses a designated initializer for the local variable opt of type struct tc_ife. This leaves padding bytes within the structure uninitialized. When nla_put() copies the entire structure into a netlink message, those uninitialized bytes are sent to userspace, resulting in a kernel information leak (infoleak). The issue was detected by the syzbot fuzzer using the Kernel Memory Sanitizer (KMSAN), which reported the leak as a KMSAN warning [1].

Exploitation

An attacker with the ability to trigger the dumping of an IFE action (e.g., via netlink operations such as tc actions show) can exploit this vulnerability. No special privileges beyond the ability to send netlink messages are required, as the leak occurs during a standard dump operation. The uninitialized kernel stack memory is copied into a netlink message, which is then transmitted to the requesting userspace process [1].

Impact

Successful exploitation allows an attacker to read uninitialized kernel stack memory, potentially leaking sensitive information such as kernel pointers, stack canaries, or other data that could be used to bypass kernel security mechanisms (e.g., KASLR). This is a confidentiality-only issue; it does not directly allow code execution or privilege escalation, but the leaked information may aid in further attacks [1].

Mitigation

The fix, committed to the Linux kernel stable tree, adds a memset() call to zero-initialize the entire struct tc_ife before assigning its fields. This ensures all padding bytes are cleared before the structure is copied to userspace. The patch has been validated by syzbot and is available in the stable kernel branches [1][2][3]. Users should apply the latest kernel updates from their distribution to remediate this vulnerability.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.