CVE-2025-40112
sparc: fix accurate exception reporting in copy_{from_to}_user for Niagara
Description
In the Linux kernel, the following vulnerability has been resolved: sparc: fix accurate exception reporting in copy_{from_to}_user for Niagara The referenced commit introduced exception handlers on user-space memory references in copy_from_user and copy_to_user. These handlers return from the respective function and calculate the remaining bytes left to copy using the current register contents. This commit fixes a couple of bad calculations and a broken epilogue in the exception handlers. This will prevent crashes and ensure correct return values of copy_from_user and copy_to_user in the faulting case. The behaviour of memcpy stays unchanged.
INFO
Published Date :
Nov. 12, 2025, 11:15 a.m.
Last Modified :
Nov. 12, 2025, 11:15 a.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products
The following products are affected by CVE-2025-40112
vulnerability.
Even if cvefeed.io is aware of the exact versions of the
products
that
are
affected, the information is not represented in the table below.
No affected product recoded yet
Solution
- Update the Linux kernel to the latest version.
- Apply the referenced commit to the kernel source.
- Recompile and install the updated kernel.
- Reboot the system with the new kernel.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2025-40112.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2025-40112 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2025-40112
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2025-40112 vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2025-40112 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Nov. 12, 2025
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: sparc: fix accurate exception reporting in copy_{from_to}_user for Niagara The referenced commit introduced exception handlers on user-space memory references in copy_from_user and copy_to_user. These handlers return from the respective function and calculate the remaining bytes left to copy using the current register contents. This commit fixes a couple of bad calculations and a broken epilogue in the exception handlers. This will prevent crashes and ensure correct return values of copy_from_user and copy_to_user in the faulting case. The behaviour of memcpy stays unchanged. Added Reference https://git.kernel.org/stable/c/05440320ea3e249d5f984918f2bf51210c1a7c03 Added Reference https://git.kernel.org/stable/c/088c5098ec6d6b0396edfbf3dad3e81de8469c1c Added Reference https://git.kernel.org/stable/c/0b67c8fc10b13a9090340c5f8a37d308f4e1571c Added Reference https://git.kernel.org/stable/c/37547d8e6eba87507279ee3dfddfd9dc46335454 Added Reference https://git.kernel.org/stable/c/7823fc4d8ab5e57f8db7806ff2530c03c166c4bb Added Reference https://git.kernel.org/stable/c/8cdeb5e482d3fdce7e825444b6ca3865e24c0228 Added Reference https://git.kernel.org/stable/c/a365ee556e45f780ee322b349a06efdad0c1458f Added Reference https://git.kernel.org/stable/c/a90ce516a73dbe087f9bf3dbf311301a58d125c6