U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2025-40035 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak Struct ff_effect_compat is embedded twice inside uinput_ff_upload_compat, contains internal padding. In particular, there is a hole after struct ff_replay to satisfy alignment requirements for the following union member. Without clearing the structure, copy_to_user() may leak stack data to userspace. Initialize ff_up_compat to zero before filling valid fields.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/1b317796013f666ae5040edbf0f230ec61496d42 kernel.org
https://git.kernel.org/stable/c/48c96b7e9e03516936d6deba54b5553097eae817 kernel.org
https://git.kernel.org/stable/c/877172b97786ed1678640dff0b2d35abb328844c kernel.org
https://git.kernel.org/stable/c/933b87c4590b42500299f00ff55f555903056803 kernel.org
https://git.kernel.org/stable/c/d3366a04770eea807f2826cbdb96934dd8c9bf79 kernel.org
https://git.kernel.org/stable/c/e63aade22a33e77b93c98c9f02db504d897a76b4 kernel.org
https://git.kernel.org/stable/c/f5e1f3b85aadce74268c46676772c3e9fa79897e kernel.org
https://git.kernel.org/stable/c/fd8a23ecbc602d00e47b27f20b07350867d0ebe5 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2025-40035
NVD Published Date:
10/28/2025
NVD Last Modified:
10/29/2025
Source:
kernel.org