net: sched: cls_api: fix tc_chain_fill_node to initialize tcm_info to zero to prevent an info-leak
Summary
| CVE | CVE-2026-43035 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-01 15:16:48 UTC |
| Updated | 2026-05-01 15:24:14 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
net: sched: cls_api: fix tc_chain_fill_node to initialize tcm_info to zero to prevent an info-leak
When building netlink messages, tc_chain_fill_node() never initializes
the tcm_info field of struct tcmsg. Since the allocation is not zeroed,
kernel heap memory is leaked to userspace through this 4-byte field.
The fix simply zeroes tcm_info alongside the other fields that are
already initialized. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected 32a4f5ecd7381f30ae3bb36dea77a150ba68af2e 903c3405cfcc7700260e456ab66a5867586c9e69 git |
Not specified |
| CNA |
Linux |
Linux |
affected 32a4f5ecd7381f30ae3bb36dea77a150ba68af2e 71a3eda7e850ae844cb8993065f4e410c11a46ce git |
Not specified |
| CNA |
Linux |
Linux |
affected 32a4f5ecd7381f30ae3bb36dea77a150ba68af2e 4ae5d23f51fb91d7d1140c6f1ba77ab0756054c3 git |
Not specified |
| CNA |
Linux |
Linux |
affected 32a4f5ecd7381f30ae3bb36dea77a150ba68af2e e35f5195cd44ff4053fbc5d71ea97681728a0099 git |
Not specified |
| CNA |
Linux |
Linux |
affected 32a4f5ecd7381f30ae3bb36dea77a150ba68af2e d6db08484c6cb3d4ad696246f9d288eceba2a078 git |
Not specified |
| CNA |
Linux |
Linux |
affected 32a4f5ecd7381f30ae3bb36dea77a150ba68af2e 906997ea3766c24fbbf9cc4bf17c047315bbd138 git |
Not specified |
| CNA |
Linux |
Linux |
affected 32a4f5ecd7381f30ae3bb36dea77a150ba68af2e 1091b3c174441a52fdbb92e2fe00338f9371a91c git |
Not specified |
| CNA |
Linux |
Linux |
affected 32a4f5ecd7381f30ae3bb36dea77a150ba68af2e e6e3eb5ee89ac4c163d46429391c889a1bb5e404 git |
Not specified |
| CNA |
Linux |
Linux |
affected 4.19 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 4.19 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.10.253 5.10.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.15.203 5.15.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.1.168 6.1.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.6.134 6.6.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.81 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.22 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.12 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/1091b3c174441a52fdbb92e2fe00338f9371a91c |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/e6e3eb5ee89ac4c163d46429391c889a1bb5e404 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/71a3eda7e850ae844cb8993065f4e410c11a46ce |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/903c3405cfcc7700260e456ab66a5867586c9e69 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/4ae5d23f51fb91d7d1140c6f1ba77ab0756054c3 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/d6db08484c6cb3d4ad696246f9d288eceba2a078 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/906997ea3766c24fbbf9cc4bf17c047315bbd138 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/e35f5195cd44ff4053fbc5d71ea97681728a0099 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.