CVE-2025-40124
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves inaccurate exception reporting in the Linux kernel functions copy_from_user and copy_to_user on UltraSPARC III architecture. Specifically, a BUG_ON in ext4 code with large folios enabled was caused by copy_from_user() returning impossibly large values greater than the size to be copied. This led to __copy_from_iter() returning incorrect values instead of the actual number of bytes copied. The root cause was that exception handlers expected a register (%o2) to be masked before the bulk copy loop, but the masking was done after, causing incorrect return values in fault cases.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to misreport the number of bytes copied from user space, potentially triggering BUG_ON conditions that may lead to kernel crashes or instability, especially in ext4 filesystem operations with large folios enabled on UltraSPARC III systems.