Description
In the Linux kernel, the following vulnerability has been resolved:

net: sched: cls_api: fix tc_chain_fill_node to initialize tcm_info to zero to prevent an info-leak

When building netlink messages, tc_chain_fill_node() never initializes
the tcm_info field of struct tcmsg. Since the allocation is not zeroed,
kernel heap memory is leaked to userspace through this 4-byte field.

The fix simply zeroes tcm_info alongside the other fields that are
already initialized.
Published: 2026-05-01
Score: 5.5 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises from the tc_chain_fill_node function in the Linux kernel not initializing the tcm_info field of struct tcmsg. Because the buffer is allocated without zeroing, parts of kernel heap memory are exposed to userspace through netlink messages, allowing local processes to read unintended data. This leakage presents a confidentiality risk and is an instance of an uninitialized memory bug (CWE-788).

Affected Systems

The flaw exists in the Linux kernel wherever the tc_chain_fill_node routine is unmodified. The specific kernel releases affected are not enumerated in the advisory, so any kernel version lacking the zeroing patch is considered vulnerable. Administrators should verify whether their installed kernel contains the commit referenced in the provided links.

Risk and Exploitability

The CVSS score is not supplied, and the EPSS score is unavailable; the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is local, where a process can send or receive traffic that triggers tc_chain_fill_node and read the leaked tcm_info field. While the exploitation requires local privileges or control over netlink traffic, the impact is unauthorized disclosure of kernel data. Given the lack of publicly demonstrated exploits, exploitation probability is considered low but non-zero.

Generated by OpenCVE AI on May 1, 2026 at 23:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that includes the commit which zeroes tcm_info in tc_chain_fill_node.
  • If an immediate kernel upgrade is not feasible, limit access to the affected netlink tc_* interfaces using firewall rules or netlink ACLs to reduce the window for local exploitation.
  • Enable system integrity monitoring (e.g., auditd, kernel module signature checks) to detect unauthorized kernel memory access and ensure that kernel updates are applied in a timely manner.

Generated by OpenCVE AI on May 1, 2026 at 23:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4561-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6243-1 linux security update
History

Sat, 02 May 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-908
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Fri, 01 May 2026 23:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-788

Fri, 01 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: net: sched: cls_api: fix tc_chain_fill_node to initialize tcm_info to zero to prevent an info-leak When building netlink messages, tc_chain_fill_node() never initializes the tcm_info field of struct tcmsg. Since the allocation is not zeroed, kernel heap memory is leaked to userspace through this 4-byte field. The fix simply zeroes tcm_info alongside the other fields that are already initialized.
Title net: sched: cls_api: fix tc_chain_fill_node to initialize tcm_info to zero to prevent an info-leak
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-01T14:15:33.922Z

Reserved: 2026-05-01T14:12:55.977Z

Link: CVE-2026-43035

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-01T15:16:48.147

Modified: 2026-05-01T15:24:14.893

Link: CVE-2026-43035

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-01T00:00:00Z

Links: CVE-2026-43035 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T23:15:29Z

Weaknesses