VYPR
Unrated severityNVD Advisory· Published Dec 6, 2025· Updated Apr 15, 2026

CVE-2025-40279

CVE-2025-40279

Description

In the Linux kernel, the following vulnerability has been resolved:

net: sched: act_connmark: initialize struct tc_ife to fix kernel leak

In tcf_connmark_dump(), the variable 'opt' was partially initialized using a designatied initializer. While the padding bytes are reamined uninitialized. nla_put() copies the entire structure into a netlink message, these uninitialized bytes leaked to userspace.

Initialize the structure with memset before assigning its fields to ensure all members and padding are cleared prior to beign copied.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Linux kernel net/sched act_connmark uses uninitialized padding bytes in struct tc_ife, leaking kernel memory to userspace via netlink.

Vulnerability

In the Linux kernel's net/sched/act_connmark module, the function tcf_connmark_dump() uses a designated initializer for the struct tc_ife local variable opt. This initializer only sets specific fields, leaving the padding bytes within the structure uninitialized. When nla_put() copies the entire opt structure into a netlink message, these uninitialized padding bytes are included, resulting in a kernel memory leak to userspace [1].

Exploitation

An attacker with the ability to trigger a dump of the connmark action (e.g., by using tc commands or other netlink operations that read action configuration) can receive the netlink message containing the leaked kernel heap memory. No special privileges beyond the ability to query TC actions are required, making this a local information disclosure vector.

Impact

A successful leak can expose sensitive kernel heap data, potentially including pointers or other confidential information that could be used to bypass kernel protections like KASLR or to aid in further exploitation. The vulnerability is classified with a low severity due to the limited scope of leaked data.

Mitigation

The fix is to explicitly initialize the entire opt structure with memset() before assigning its fields, ensuring that all padding bytes are cleared prior to copying. The patch has been applied to the stable kernel tree [2][3]. Users should update to a kernel version containing the commit.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)

Patches

6

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.