{"id":"CVE-2025-40278","summary":"net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak\n\nFix a KMSAN kernel-infoleak detected  by the syzbot .\n\n[net?] KMSAN: kernel-infoleak in __skb_datagram_iter\n\nIn tcf_ife_dump(), the variable 'opt' was partially initialized using a\ndesignatied initializer. While the padding bytes are reamined\nuninitialized. nla_put() copies the entire structure into a\nnetlink message, these uninitialized bytes leaked to userspace.\n\nInitialize the structure with memset before assigning its fields\nto ensure all members and padding are cleared prior to beign copied.\n\nThis change silences the KMSAN report and prevents potential information\nleaks from the kernel memory.\n\nThis fix has been tested and validated by syzbot. This patch closes the\nbug reported at the following syzkaller link and ensures no infoleak.","modified":"2026-03-31T17:29:56.618316Z","published":"2025-12-06T21:51:01.693Z","related":["MGASA-2026-0017","MGASA-2026-0018","SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:0316-1","SUSE-SU-2026:20207-1","SUSE-SU-2026:20220-1","SUSE-SU-2026:20228-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","openSUSE-SU-2026:20145-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40278.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2191662058443e0bcc28d11694293d8339af6dde"},{"type":"WEB","url":"https://git.kernel.org/stable/c/37f0680887c5aeba9a433fe04b35169010568bb1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5e3644ef147bf7140259dfa4cace680c9b26fe8b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/918e063304f945fb93be9bb70cacea07d0b730ea"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a676a296af65d33725bdf7396803180957dbd92e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c8f51dad94cbb88054e2aacc272b3ce1ed11fb1e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ce50039be49eea9b4cd8873ca6eccded1b4a130a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d1dbbbe839647486c9b893e5011fe84a052962df"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40278.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-40278"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"ef6980b6becb1afd9d82a4f043749a10ae81bf14"},{"fixed":"918e063304f945fb93be9bb70cacea07d0b730ea"},{"fixed":"5e3644ef147bf7140259dfa4cace680c9b26fe8b"},{"fixed":"37f0680887c5aeba9a433fe04b35169010568bb1"},{"fixed":"2191662058443e0bcc28d11694293d8339af6dde"},{"fixed":"a676a296af65d33725bdf7396803180957dbd92e"},{"fixed":"d1dbbbe839647486c9b893e5011fe84a052962df"},{"fixed":"c8f51dad94cbb88054e2aacc272b3ce1ed11fb1e"},{"fixed":"ce50039be49eea9b4cd8873ca6eccded1b4a130a"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40278.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.6.0"},{"fixed":"5.4.302"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.247"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.197"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.159"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.117"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.59"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.9"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40278.json"}}],"schema_version":"1.7.5"}