0.0
NA
CVE-2025-40112
sparc: fix accurate exception reporting in copy_{from_to}_user for Niagara
Description

In the Linux kernel, the following vulnerability has been resolved: sparc: fix accurate exception reporting in copy_{from_to}_user for Niagara The referenced commit introduced exception handlers on user-space memory references in copy_from_user and copy_to_user. These handlers return from the respective function and calculate the remaining bytes left to copy using the current register contents. This commit fixes a couple of bad calculations and a broken epilogue in the exception handlers. This will prevent crashes and ensure correct return values of copy_from_user and copy_to_user in the faulting case. The behaviour of memcpy stays unchanged.

INFO

Published Date :

Nov. 12, 2025, 11:15 a.m.

Last Modified :

Nov. 12, 2025, 11:15 a.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2025-40112 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

No affected product recoded yet

Solution
Update the Linux kernel to fix exception reporting errors in memory copy functions.
  • Update the Linux kernel to the latest version.
  • Apply the referenced commit to the kernel source.
  • Recompile and install the updated kernel.
  • Reboot the system with the new kernel.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2025-40112 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2025-40112 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2025-40112 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2025-40112 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Nov. 12, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: sparc: fix accurate exception reporting in copy_{from_to}_user for Niagara The referenced commit introduced exception handlers on user-space memory references in copy_from_user and copy_to_user. These handlers return from the respective function and calculate the remaining bytes left to copy using the current register contents. This commit fixes a couple of bad calculations and a broken epilogue in the exception handlers. This will prevent crashes and ensure correct return values of copy_from_user and copy_to_user in the faulting case. The behaviour of memcpy stays unchanged.
    Added Reference https://git.kernel.org/stable/c/05440320ea3e249d5f984918f2bf51210c1a7c03
    Added Reference https://git.kernel.org/stable/c/088c5098ec6d6b0396edfbf3dad3e81de8469c1c
    Added Reference https://git.kernel.org/stable/c/0b67c8fc10b13a9090340c5f8a37d308f4e1571c
    Added Reference https://git.kernel.org/stable/c/37547d8e6eba87507279ee3dfddfd9dc46335454
    Added Reference https://git.kernel.org/stable/c/7823fc4d8ab5e57f8db7806ff2530c03c166c4bb
    Added Reference https://git.kernel.org/stable/c/8cdeb5e482d3fdce7e825444b6ca3865e24c0228
    Added Reference https://git.kernel.org/stable/c/a365ee556e45f780ee322b349a06efdad0c1458f
    Added Reference https://git.kernel.org/stable/c/a90ce516a73dbe087f9bf3dbf311301a58d125c6
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
No CVSS metrics available for this vulnerability.