CVE-2025-40112
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-11-12

Last updated on: 2025-11-12

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: sparc: fix accurate exception reporting in copy_{from_to}_user for Niagara The referenced commit introduced exception handlers on user-space memory references in copy_from_user and copy_to_user. These handlers return from the respective function and calculate the remaining bytes left to copy using the current register contents. This commit fixes a couple of bad calculations and a broken epilogue in the exception handlers. This will prevent crashes and ensure correct return values of copy_from_user and copy_to_user in the faulting case. The behaviour of memcpy stays unchanged.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-12
Last Modified
2025-11-12
Generated
2026-05-07
AI Q&A
2025-11-13
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability relates to the Linux kernel on sparc architecture, specifically the Niagara platform. It involves inaccurate exception reporting in the functions copy_from_user and copy_to_user, which handle copying data between user space and kernel space. The issue was that exception handlers introduced to manage user-space memory references had bad calculations and a broken epilogue, causing incorrect return values and potential crashes. The fix corrects these calculations and the epilogue to prevent crashes and ensure correct behavior when exceptions occur during these memory copy operations.


How can this vulnerability impact me? :

This vulnerability can cause crashes in the Linux kernel when copying data between user space and kernel space on affected sparc systems. It may also lead to incorrect return values from the copy_from_user and copy_to_user functions, potentially causing improper handling of memory operations and instability in the system.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart