CVE-2025-40126
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability relates to the Linux kernel on UltraSPARC systems, where exception handlers in the functions copy_from_user and copy_to_user did not correctly calculate the remaining bytes to copy after a fault occurred. This caused inaccurate exception reporting and incorrect return values from these functions. The issue has been fixed to ensure accurate exception handling and correct return values during user-space memory operations.
How can this vulnerability impact me? :
The vulnerability could lead to incorrect handling of exceptions during user-space memory copying operations, potentially causing software relying on these functions to behave unexpectedly or incorrectly handle errors. This might affect system stability or security on UltraSPARC Linux systems if the return values from these functions are used for critical decision-making.