CVE-2025-40279

EUVD-2025-201576
In the Linux kernel, the following vulnerability has been resolved:

net: sched: act_connmark: initialize struct tc_ife to fix kernel leak

In tcf_connmark_dump(), the variable 'opt' was partially initialized using a
designatied initializer. While the padding bytes are reamined
uninitialized. nla_put() copies the entire structure into a
netlink message, these uninitialized bytes leaked to userspace.

Initialize the structure with memset before assigning its fields
to ensure all members and padding are cleared prior to beign copied.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
UNKNOWN
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 26%
Debian logo
Debian Releases
Debian Product
Codename
linux
bookworm
6.1.170-3
fixed
bookworm (security)
6.1.172-1
fixed
bullseye
vulnerable
bullseye (security)
vulnerable
forky
7.0.7-1
fixed
sid
7.0.7-1
fixed
trixie
6.12.86-1
fixed
trixie (security)
6.12.88-1
fixed
linux-6.1
bullseye (security)
6.1.172-1~deb11u1
fixed
openSUSE logo
openSUSE / SLES Releases
openSUSE Product
Release
cluster-md-kmp-default
suse enterprise server 12 SP5
4.12.14-122.290.1
fixed
dlm-kmp-default
suse enterprise server 12 SP5
4.12.14-122.290.1
fixed
gfs2-kmp-default
suse enterprise server 12 SP5
4.12.14-122.290.1
fixed
kernel-64kb
suse enterprise desktop 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.28.1
fixed
kernel-azure
suse enterprise sap 15 SP7
6.4.0-150700.20.24.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.20.24.1
fixed
kernel-default
suse enterprise desktop 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise server 12 SP5
4.12.14-122.290.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.28.1
fixed
kernel-default-base
suse enterprise desktop 15 SP7
6.4.0-150700.53.28.1.150700.17.19.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.28.1.150700.17.19.1
fixed
suse enterprise server 12 SP5
4.12.14-122.290.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.28.1.150700.17.19.1
fixed
kernel-default-man
suse enterprise server 12 SP5
4.12.14-122.290.1
fixed
kernel-docs
suse enterprise desktop 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.28.1
fixed
kernel-macros
suse enterprise desktop 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise server 12 SP5
4.12.14-122.290.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.28.1
fixed
kernel-obs-build
suse enterprise desktop 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.28.1
fixed
kernel-source
suse enterprise desktop 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise server 12 SP5
4.12.14-122.290.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.28.1
fixed
kernel-source-azure
suse enterprise sap 15 SP7
6.4.0-150700.20.24.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.20.24.1
fixed
kernel-syms
suse enterprise desktop 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise server 12 SP5
4.12.14-122.290.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.28.1
fixed
kernel-syms-azure
suse enterprise sap 15 SP7
6.4.0-150700.20.24.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.20.24.1
fixed
kernel-zfcpdump
suse enterprise desktop 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.28.1
fixed
ocfs2-kmp-default
suse enterprise server 12 SP5
4.12.14-122.290.1
fixed