-

CVE-2025-40126

In the Linux kernel, the following vulnerability has been resolved:

sparc: fix accurate exception reporting in copy_{from_to}_user for UltraSPARC

The referenced commit introduced exception handlers on user-space memory
references in copy_from_user and copy_to_user. These handlers return from
the respective function and calculate the remaining bytes left to copy
using the current register contents. This commit fixes a couple of bad
calculations. This will fix the return value of copy_from_user and
copy_to_user in the faulting case. The behaviour of memcpy stays unchanged.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 0bf3dc3a2156f1c5ddaba4b85d09767874634114
Version cb736fdbb208eb3420f1a2eb2bfc024a6e9dcada
Status affected
Version < 41c18baee66134e6ef786eb075c1b6adb22432b0
Version cb736fdbb208eb3420f1a2eb2bfc024a6e9dcada
Status affected
Version < 59424dc0d0e044b2eb007686a4724ddd91d57db5
Version cb736fdbb208eb3420f1a2eb2bfc024a6e9dcada
Status affected
Version < 9b137f277cc3297044aabd950f589e505d30104c
Version cb736fdbb208eb3420f1a2eb2bfc024a6e9dcada
Status affected
Version < 674ff598148a28bae0b5372339de56f2abf0b1d1
Version cb736fdbb208eb3420f1a2eb2bfc024a6e9dcada
Status affected
Version < 7de3a75bbc8465d816336c74d50109e73501efab
Version cb736fdbb208eb3420f1a2eb2bfc024a6e9dcada
Status affected
Version < 57c278500fce3cd4e1c540700c0b05426a958393
Version cb736fdbb208eb3420f1a2eb2bfc024a6e9dcada
Status affected
Version < 4fba1713001195e59cfc001ff1f2837dab877efb
Version cb736fdbb208eb3420f1a2eb2bfc024a6e9dcada
Status affected
Version 1731d90d8a558ecb20cdee0c2c001ae8e15c251d
Status affected
Version b0580eadc19ff3a617a7d07cfaf2a985153c114e
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.9
Status affected
Version < 4.9
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.301
Status unaffected
Version <= 5.10.*
Version 5.10.246
Status unaffected
Version <= 5.15.*
Version 5.15.195
Status unaffected
Version <= 6.1.*
Version 6.1.156
Status unaffected
Version <= 6.6.*
Version 6.6.112
Status unaffected
Version <= 6.12.*
Version 6.12.53
Status unaffected
Version <= 6.17.*
Version 6.17.3
Status unaffected
Version <= *
Version 6.18
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.08% 0.243
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String