CVE-2025-40279
Description
In the Linux kernel, the following vulnerability has been resolved:
net: sched: act_connmark: initialize struct tc_ife to fix kernel leak
In tcf_connmark_dump(), the variable 'opt' was partially initialized using a designatied initializer. While the padding bytes are reamined uninitialized. nla_put() copies the entire structure into a netlink message, these uninitialized bytes leaked to userspace.
Initialize the structure with memset before assigning its fields to ensure all members and padding are cleared prior to beign copied.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Linux kernel net/sched act_connmark uses uninitialized padding bytes in struct tc_ife, leaking kernel memory to userspace via netlink.
Vulnerability
In the Linux kernel's net/sched/act_connmark module, the function tcf_connmark_dump() uses a designated initializer for the struct tc_ife local variable opt. This initializer only sets specific fields, leaving the padding bytes within the structure uninitialized. When nla_put() copies the entire opt structure into a netlink message, these uninitialized padding bytes are included, resulting in a kernel memory leak to userspace [1].
Exploitation
An attacker with the ability to trigger a dump of the connmark action (e.g., by using tc commands or other netlink operations that read action configuration) can receive the netlink message containing the leaked kernel heap memory. No special privileges beyond the ability to query TC actions are required, making this a local information disclosure vector.
Impact
A successful leak can expose sensitive kernel heap data, potentially including pointers or other confidential information that could be used to bypass kernel protections like KASLR or to aid in further exploitation. The vulnerability is classified with a low severity due to the limited scope of leaked data.
Mitigation
The fix is to explicitly initialize the entire opt structure with memset() before assigning its fields, ensuring that all padding bytes are cleared prior to copying. The patch has been applied to the stable kernel tree [2][3]. Users should update to a kernel version containing the commit.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
6218b67c8c82473cc56c608c231e4aa93e2e551cb05d4fd6325837889ec0662b656e43eaeVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- git.kernel.org/stable/c/218b67c8c8246d47a2a7910eae80abe4861fe2b7nvd
- git.kernel.org/stable/c/25837889ec062f2b7618142cd80253dff3da5343nvd
- git.kernel.org/stable/c/31e4aa93e2e5b5647fc235b0f6ee329646878f9envd
- git.kernel.org/stable/c/51cb05d4fd632596816ba44e882e84db9fb28a7envd
- git.kernel.org/stable/c/62b656e43eaeae445a39cd8021a4f47065af4389nvd
- git.kernel.org/stable/c/73cc56c608c209d3d666cc571293b090a471da70nvd
News mentions
0No linked articles in our index yet.