CVE-2025-40278 (GCVE-0-2025-40278)

Vulnerability from cvelistv5 – Published: 2025-12-06 21:51 – Updated: 2025-12-06 21:51
VLAI?
Summary
In the Linux kernel, the following vulnerability has been resolved: net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak Fix a KMSAN kernel-infoleak detected by the syzbot . [net?] KMSAN: kernel-infoleak in __skb_datagram_iter In tcf_ife_dump(), the variable 'opt' was partially initialized using a designatied initializer. While the padding bytes are reamined uninitialized. nla_put() copies the entire structure into a netlink message, these uninitialized bytes leaked to userspace. Initialize the structure with memset before assigning its fields to ensure all members and padding are cleared prior to beign copied. This change silences the KMSAN report and prevents potential information leaks from the kernel memory. This fix has been tested and validated by syzbot. This patch closes the bug reported at the following syzkaller link and ensures no infoleak.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: ef6980b6becb1afd9d82a4f043749a10ae81bf14 , < 918e063304f945fb93be9bb70cacea07d0b730ea (git)
Affected: ef6980b6becb1afd9d82a4f043749a10ae81bf14 , < 5e3644ef147bf7140259dfa4cace680c9b26fe8b (git)
Affected: ef6980b6becb1afd9d82a4f043749a10ae81bf14 , < 37f0680887c5aeba9a433fe04b35169010568bb1 (git)
Affected: ef6980b6becb1afd9d82a4f043749a10ae81bf14 , < 2191662058443e0bcc28d11694293d8339af6dde (git)
Affected: ef6980b6becb1afd9d82a4f043749a10ae81bf14 , < a676a296af65d33725bdf7396803180957dbd92e (git)
Affected: ef6980b6becb1afd9d82a4f043749a10ae81bf14 , < d1dbbbe839647486c9b893e5011fe84a052962df (git)
Affected: ef6980b6becb1afd9d82a4f043749a10ae81bf14 , < c8f51dad94cbb88054e2aacc272b3ce1ed11fb1e (git)
Affected: ef6980b6becb1afd9d82a4f043749a10ae81bf14 , < ce50039be49eea9b4cd8873ca6eccded1b4a130a (git)
Create a notification for this product.
    Linux Linux Affected: 4.6
Unaffected: 0 , < 4.6 (semver)
Unaffected: 5.4.302 , ≤ 5.4.* (semver)
Unaffected: 5.10.247 , ≤ 5.10.* (semver)
Unaffected: 5.15.197 , ≤ 5.15.* (semver)
Unaffected: 6.1.159 , ≤ 6.1.* (semver)
Unaffected: 6.6.117 , ≤ 6.6.* (semver)
Unaffected: 6.12.59 , ≤ 6.12.* (semver)
Unaffected: 6.17.9 , ≤ 6.17.* (semver)
Unaffected: 6.18 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/sched/act_ife.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "918e063304f945fb93be9bb70cacea07d0b730ea",
              "status": "affected",
              "version": "ef6980b6becb1afd9d82a4f043749a10ae81bf14",
              "versionType": "git"
            },
            {
              "lessThan": "5e3644ef147bf7140259dfa4cace680c9b26fe8b",
              "status": "affected",
              "version": "ef6980b6becb1afd9d82a4f043749a10ae81bf14",
              "versionType": "git"
            },
            {
              "lessThan": "37f0680887c5aeba9a433fe04b35169010568bb1",
              "status": "affected",
              "version": "ef6980b6becb1afd9d82a4f043749a10ae81bf14",
              "versionType": "git"
            },
            {
              "lessThan": "2191662058443e0bcc28d11694293d8339af6dde",
              "status": "affected",
              "version": "ef6980b6becb1afd9d82a4f043749a10ae81bf14",
              "versionType": "git"
            },
            {
              "lessThan": "a676a296af65d33725bdf7396803180957dbd92e",
              "status": "affected",
              "version": "ef6980b6becb1afd9d82a4f043749a10ae81bf14",
              "versionType": "git"
            },
            {
              "lessThan": "d1dbbbe839647486c9b893e5011fe84a052962df",
              "status": "affected",
              "version": "ef6980b6becb1afd9d82a4f043749a10ae81bf14",
              "versionType": "git"
            },
            {
              "lessThan": "c8f51dad94cbb88054e2aacc272b3ce1ed11fb1e",
              "status": "affected",
              "version": "ef6980b6becb1afd9d82a4f043749a10ae81bf14",
              "versionType": "git"
            },
            {
              "lessThan": "ce50039be49eea9b4cd8873ca6eccded1b4a130a",
              "status": "affected",
              "version": "ef6980b6becb1afd9d82a4f043749a10ae81bf14",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "net/sched/act_ife.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "4.6"
            },
            {
              "lessThan": "4.6",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.302",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.247",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.197",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.159",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.117",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.59",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.17.*",
              "status": "unaffected",
              "version": "6.17.9",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.18",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.302",
                  "versionStartIncluding": "4.6",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.247",
                  "versionStartIncluding": "4.6",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.197",
                  "versionStartIncluding": "4.6",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.159",
                  "versionStartIncluding": "4.6",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.117",
                  "versionStartIncluding": "4.6",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.59",
                  "versionStartIncluding": "4.6",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.17.9",
                  "versionStartIncluding": "4.6",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.18",
                  "versionStartIncluding": "4.6",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak\n\nFix a KMSAN kernel-infoleak detected  by the syzbot .\n\n[net?] KMSAN: kernel-infoleak in __skb_datagram_iter\n\nIn tcf_ife_dump(), the variable \u0027opt\u0027 was partially initialized using a\ndesignatied initializer. While the padding bytes are reamined\nuninitialized. nla_put() copies the entire structure into a\nnetlink message, these uninitialized bytes leaked to userspace.\n\nInitialize the structure with memset before assigning its fields\nto ensure all members and padding are cleared prior to beign copied.\n\nThis change silences the KMSAN report and prevents potential information\nleaks from the kernel memory.\n\nThis fix has been tested and validated by syzbot. This patch closes the\nbug reported at the following syzkaller link and ensures no infoleak."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-06T21:51:01.693Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/918e063304f945fb93be9bb70cacea07d0b730ea"
        },
        {
          "url": "https://git.kernel.org/stable/c/5e3644ef147bf7140259dfa4cace680c9b26fe8b"
        },
        {
          "url": "https://git.kernel.org/stable/c/37f0680887c5aeba9a433fe04b35169010568bb1"
        },
        {
          "url": "https://git.kernel.org/stable/c/2191662058443e0bcc28d11694293d8339af6dde"
        },
        {
          "url": "https://git.kernel.org/stable/c/a676a296af65d33725bdf7396803180957dbd92e"
        },
        {
          "url": "https://git.kernel.org/stable/c/d1dbbbe839647486c9b893e5011fe84a052962df"
        },
        {
          "url": "https://git.kernel.org/stable/c/c8f51dad94cbb88054e2aacc272b3ce1ed11fb1e"
        },
        {
          "url": "https://git.kernel.org/stable/c/ce50039be49eea9b4cd8873ca6eccded1b4a130a"
        }
      ],
      "title": "net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-40278",
    "datePublished": "2025-12-06T21:51:01.693Z",
    "dateReserved": "2025-04-16T07:20:57.184Z",
    "dateUpdated": "2025-12-06T21:51:01.693Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-40278\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-12-06T22:15:55.700\",\"lastModified\":\"2025-12-08T18:26:49.133\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak\\n\\nFix a KMSAN kernel-infoleak detected  by the syzbot .\\n\\n[net?] KMSAN: kernel-infoleak in __skb_datagram_iter\\n\\nIn tcf_ife_dump(), the variable \u0027opt\u0027 was partially initialized using a\\ndesignatied initializer. While the padding bytes are reamined\\nuninitialized. nla_put() copies the entire structure into a\\nnetlink message, these uninitialized bytes leaked to userspace.\\n\\nInitialize the structure with memset before assigning its fields\\nto ensure all members and padding are cleared prior to beign copied.\\n\\nThis change silences the KMSAN report and prevents potential information\\nleaks from the kernel memory.\\n\\nThis fix has been tested and validated by syzbot. This patch closes the\\nbug reported at the following syzkaller link and ensures no infoleak.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/2191662058443e0bcc28d11694293d8339af6dde\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/37f0680887c5aeba9a433fe04b35169010568bb1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/5e3644ef147bf7140259dfa4cace680c9b26fe8b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/918e063304f945fb93be9bb70cacea07d0b730ea\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a676a296af65d33725bdf7396803180957dbd92e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c8f51dad94cbb88054e2aacc272b3ce1ed11fb1e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ce50039be49eea9b4cd8873ca6eccded1b4a130a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d1dbbbe839647486c9b893e5011fe84a052962df\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…