-

CVE-2025-40112

In the Linux kernel, the following vulnerability has been resolved:

sparc: fix accurate exception reporting in copy_{from_to}_user for Niagara

The referenced commit introduced exception handlers on user-space memory
references in copy_from_user and copy_to_user. These handlers return from
the respective function and calculate the remaining bytes left to copy
using the current register contents. This commit fixes a couple of bad
calculations and a broken epilogue in the exception handlers. This will
prevent crashes and ensure correct return values of copy_from_user and
copy_to_user in the faulting case. The behaviour of memcpy stays unchanged.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 05440320ea3e249d5f984918f2bf51210c1a7c03
Version 7ae3aaf53f1695877ccd5ebbc49ea65991e41f1e
Status affected
Version < 7823fc4d8ab5e57f8db7806ff2530c03c166c4bb
Version 7ae3aaf53f1695877ccd5ebbc49ea65991e41f1e
Status affected
Version < 37547d8e6eba87507279ee3dfddfd9dc46335454
Version 7ae3aaf53f1695877ccd5ebbc49ea65991e41f1e
Status affected
Version < a365ee556e45f780ee322b349a06efdad0c1458f
Version 7ae3aaf53f1695877ccd5ebbc49ea65991e41f1e
Status affected
Version < 8cdeb5e482d3fdce7e825444b6ca3865e24c0228
Version 7ae3aaf53f1695877ccd5ebbc49ea65991e41f1e
Status affected
Version < a90ce516a73dbe087f9bf3dbf311301a58d125c6
Version 7ae3aaf53f1695877ccd5ebbc49ea65991e41f1e
Status affected
Version < 088c5098ec6d6b0396edfbf3dad3e81de8469c1c
Version 7ae3aaf53f1695877ccd5ebbc49ea65991e41f1e
Status affected
Version < 0b67c8fc10b13a9090340c5f8a37d308f4e1571c
Version 7ae3aaf53f1695877ccd5ebbc49ea65991e41f1e
Status affected
Version bfc8be6593097cb074d3912ba2f27565cfbb7d6e
Status affected
Version a15859f9d8396cce7c55ccdb7e75f70f14cbc349
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.9
Status affected
Version < 4.9
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.301
Status unaffected
Version <= 5.10.*
Version 5.10.246
Status unaffected
Version <= 5.15.*
Version 5.15.195
Status unaffected
Version <= 6.1.*
Version 6.1.156
Status unaffected
Version <= 6.6.*
Version 6.6.112
Status unaffected
Version <= 6.12.*
Version 6.12.53
Status unaffected
Version <= 6.17.*
Version 6.17.3
Status unaffected
Version <= *
Version 6.18
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.06% 0.191
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String