CVE-2025-40112
Linux Debian vulnerability analysis and mitigation

Overview

CVE-2025-40112 is a vulnerability in the Linux kernel affecting the SPARC architecture, specifically related to exception reporting in copy_{from_to}_user functions for Niagara processors. The vulnerability was disclosed on November 12, 2025 (NVD).

Technical details

The vulnerability involves incorrect exception handling for user-space memory references in copy_from_user and copy_to_user functions. The issue stems from bad calculations and a broken epilogue in the exception handlers, which affects how remaining bytes are calculated using current register contents during memory operations (NVD).

Impact

This vulnerability can lead to system crashes and incorrect return values from copy_from_user and copy_to_user functions in fault scenarios. The behavior of memcpy remains unaffected by this issue (NVD).

Mitigation and workarounds

Multiple Linux distributions have released or are working on fixes. Debian has fixed the issue in version 6.1.158-1 for bookworm, 6.12.57-1 for trixie, and 6.17.8-1 for forky releases. Ubuntu has marked this vulnerability as medium priority and is actively working on updates for affected versions (Debian, Ubuntu).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22776HIGH8.7
  • Linux DebianLinux Debian
  • cpp-httplib
NoNoJan 12, 2026
CVE-2026-22801MEDIUM6.8
  • OpenJDK JDKOpenJDK JDK
  • java-21-openjdk-demo-fastdebug
NoYesJan 12, 2026
CVE-2026-22695MEDIUM6.1
  • OpenJDK JDKOpenJDK JDK
  • java-25-openjdk-static-libs
NoYesJan 12, 2026
CVE-2026-22251MEDIUM5.3
  • PythonPython
  • wlc
NoYesJan 12, 2026
CVE-2026-0665N/AN/A
  • Linux DebianLinux Debian
  • qemu
NoNoJan 13, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management