CVE-2026-43035 PUBLISHED

net: sched: cls_api: fix tc_chain_fill_node to initialize tcm_info to zero to prevent an info-leak

Assigner: Linux
Reserved: 01.05.2026 Published: 01.05.2026 Updated: 01.05.2026

In the Linux kernel, the following vulnerability has been resolved:

net: sched: cls_api: fix tc_chain_fill_node to initialize tcm_info to zero to prevent an info-leak

When building netlink messages, tc_chain_fill_node() never initializes the tcm_info field of struct tcmsg. Since the allocation is not zeroed, kernel heap memory is leaked to userspace through this 4-byte field.

The fix simply zeroes tcm_info alongside the other fields that are already initialized.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 32a4f5ecd7381f30ae3bb36dea77a150ba68af2e to 903c3405cfcc7700260e456ab66a5867586c9e69 (excl.)
  • affected from 32a4f5ecd7381f30ae3bb36dea77a150ba68af2e to 71a3eda7e850ae844cb8993065f4e410c11a46ce (excl.)
  • affected from 32a4f5ecd7381f30ae3bb36dea77a150ba68af2e to 4ae5d23f51fb91d7d1140c6f1ba77ab0756054c3 (excl.)
  • affected from 32a4f5ecd7381f30ae3bb36dea77a150ba68af2e to e35f5195cd44ff4053fbc5d71ea97681728a0099 (excl.)
  • affected from 32a4f5ecd7381f30ae3bb36dea77a150ba68af2e to d6db08484c6cb3d4ad696246f9d288eceba2a078 (excl.)
  • affected from 32a4f5ecd7381f30ae3bb36dea77a150ba68af2e to 906997ea3766c24fbbf9cc4bf17c047315bbd138 (excl.)
  • affected from 32a4f5ecd7381f30ae3bb36dea77a150ba68af2e to 1091b3c174441a52fdbb92e2fe00338f9371a91c (excl.)
  • affected from 32a4f5ecd7381f30ae3bb36dea77a150ba68af2e to e6e3eb5ee89ac4c163d46429391c889a1bb5e404 (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 4.19 is affected
  • unaffected from 0 to 4.19 (excl.)
  • unaffected from 5.10.253 to 5.10.* (incl.)
  • unaffected from 5.15.203 to 5.15.* (incl.)
  • unaffected from 6.1.168 to 6.1.* (incl.)
  • unaffected from 6.6.134 to 6.6.* (incl.)
  • unaffected from 6.12.81 to 6.12.* (incl.)
  • unaffected from 6.18.22 to 6.18.* (incl.)
  • unaffected from 6.19.12 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References