Improper Initialization in Linux kernel - CVE-2026-43035
Published: May 2, 2026
Linux kernel
Detailed vulnerability description
The vulnerability allows a local user to disclose sensitive information.
The vulnerability exists due to improper initialization in tc_chain_fill_node() when building netlink messages. A local user can trigger the kernel to generate a netlink message to disclose sensitive information.
Kernel heap memory may be exposed to userspace through the 4-byte tcm_info field of struct tcmsg.
How to mitigate CVE-2026-43035
Sources
- https://git.kernel.org/stable/c/1091b3c174441a52fdbb92e2fe00338f9371a91c
- https://git.kernel.org/stable/c/4ae5d23f51fb91d7d1140c6f1ba77ab0756054c3
- https://git.kernel.org/stable/c/71a3eda7e850ae844cb8993065f4e410c11a46ce
- https://git.kernel.org/stable/c/903c3405cfcc7700260e456ab66a5867586c9e69
- https://git.kernel.org/stable/c/906997ea3766c24fbbf9cc4bf17c047315bbd138
- https://git.kernel.org/stable/c/d6db08484c6cb3d4ad696246f9d288eceba2a078
- https://git.kernel.org/stable/c/e35f5195cd44ff4053fbc5d71ea97681728a0099
- https://git.kernel.org/stable/c/e6e3eb5ee89ac4c163d46429391c889a1bb5e404