lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025120717-CVE-2025-40279-81d3@gregkh>
Date: Sun,  7 Dec 2025 06:52:26 +0900
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2025-40279: net: sched: act_connmark: initialize struct tc_ife to fix kernel leak

From: Greg Kroah-Hartman <gregkh@...nel.org>

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

net: sched: act_connmark: initialize struct tc_ife to fix kernel leak

In tcf_connmark_dump(), the variable 'opt' was partially initialized using a
designatied initializer. While the padding bytes are reamined
uninitialized. nla_put() copies the entire structure into a
netlink message, these uninitialized bytes leaked to userspace.

Initialize the structure with memset before assigning its fields
to ensure all members and padding are cleared prior to beign copied.

The Linux kernel CVE team has assigned CVE-2025-40279 to this issue.


Affected and fixed versions
===========================

	Issue introduced in 4.0 with commit 22a5dc0e5e3e8fef804230cd73ed7b0afd4c7bae and fixed in 5.15.197 with commit 218b67c8c8246d47a2a7910eae80abe4861fe2b7
	Issue introduced in 4.0 with commit 22a5dc0e5e3e8fef804230cd73ed7b0afd4c7bae and fixed in 6.1.159 with commit 73cc56c608c209d3d666cc571293b090a471da70
	Issue introduced in 4.0 with commit 22a5dc0e5e3e8fef804230cd73ed7b0afd4c7bae and fixed in 6.6.117 with commit 31e4aa93e2e5b5647fc235b0f6ee329646878f9e
	Issue introduced in 4.0 with commit 22a5dc0e5e3e8fef804230cd73ed7b0afd4c7bae and fixed in 6.12.59 with commit 51cb05d4fd632596816ba44e882e84db9fb28a7e
	Issue introduced in 4.0 with commit 22a5dc0e5e3e8fef804230cd73ed7b0afd4c7bae and fixed in 6.17.9 with commit 25837889ec062f2b7618142cd80253dff3da5343
	Issue introduced in 4.0 with commit 22a5dc0e5e3e8fef804230cd73ed7b0afd4c7bae and fixed in 6.18 with commit 62b656e43eaeae445a39cd8021a4f47065af4389

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2025-40279
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	net/sched/act_connmark.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/218b67c8c8246d47a2a7910eae80abe4861fe2b7
	https://git.kernel.org/stable/c/73cc56c608c209d3d666cc571293b090a471da70
	https://git.kernel.org/stable/c/31e4aa93e2e5b5647fc235b0f6ee329646878f9e
	https://git.kernel.org/stable/c/51cb05d4fd632596816ba44e882e84db9fb28a7e
	https://git.kernel.org/stable/c/25837889ec062f2b7618142cd80253dff3da5343
	https://git.kernel.org/stable/c/62b656e43eaeae445a39cd8021a4f47065af4389

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ