CVE-2026-43035
Published: Fri, 01 May 2026 15:16
Summary
In the Linux kernel, the following vulnerability has been resolved: net: sched: cls_api: fix tc_chain_fill_node to initialize tcm_info to zero to prevent an info-leak When building netlink messages,
Details
In the Linux kernel, the following vulnerability has been resolved: net: sched: cls_api: fix tc_chain_fill_node to initialize tcm_info to zero to prevent an info-leak When building netlink messages, tc_chain_fill_node() never initializes the tcm_info field of struct tcmsg. Since the allocation is not zeroed, kernel heap memory is leaked to userspace through this 4-byte field. The fix simply zeroes tcm_info alongside the other fields that are already initialized.
Are YOU affected by CVE-2026-43035?
5-second check on your actual server. Reads /etc/os-release, uname -r, and dpkg-query; matches against the live USN + Debian Security Tracker feeds; tells you whether CVE-2026-43035 (and any other live CVE) applies. Anonymous, no signup.
curl https://mindsparkstack.com/scan.sh | bash
References
- https://git.kernel.org/stable/c/1091b3c174441a52fdbb92e2fe00338f9371a91c
- https://git.kernel.org/stable/c/4ae5d23f51fb91d7d1140c6f1ba77ab0756054c3
- https://git.kernel.org/stable/c/71a3eda7e850ae844cb8993065f4e410c11a46ce
- https://git.kernel.org/stable/c/903c3405cfcc7700260e456ab66a5867586c9e69
- https://git.kernel.org/stable/c/906997ea3766c24fbbf9cc4bf17c047315bbd138
- https://git.kernel.org/stable/c/d6db08484c6cb3d4ad696246f9d288eceba2a078
- https://git.kernel.org/stable/c/e35f5195cd44ff4053fbc5d71ea97681728a0099
- https://git.kernel.org/stable/c/e6e3eb5ee89ac4c163d46429391c889a1bb5e404
StackPatch runs this match against YOUR installed packages every hour
Free 1-server / $99 lifetime founder seat (50 only) / $19+/mo monthly. Indie pricing.