In the Linux kernel, the following vulnerability has been resolved:
Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak
Struct ff_effect_compat is embedded twice inside
uinput_ff_upload_compat, contains internal padding. In particular, there
is a hole after struct ff_replay to satisfy alignment requirements for
the following union member. Without clearing the structure,
copy_to_user() may leak stack data to userspace.
Initialize ff_up_compat to zero before filling valid fields.
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 29 Oct 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | 
Wed, 29 Oct 2025 11:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Linux Linux linux Kernel | |
| Vendors & Products | Linux Linux linux Kernel | 
Wed, 29 Oct 2025 00:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | |
| Metrics | threat_severity 
 | cvssV3_1 
 
 | 
Tue, 28 Oct 2025 12:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak Struct ff_effect_compat is embedded twice inside uinput_ff_upload_compat, contains internal padding. In particular, there is a hole after struct ff_replay to satisfy alignment requirements for the following union member. Without clearing the structure, copy_to_user() may leak stack data to userspace. Initialize ff_up_compat to zero before filling valid fields. | |
| Title | Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak | |
| References |  | 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-10-29T13:19:36.823Z
Reserved: 2025-04-16T07:20:57.153Z
Link: CVE-2025-40035
 Vulnrichment
                        Vulnrichment
                    No data.
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-10-28T12:15:37.363
Modified: 2025-10-30T15:05:32.197
Link: CVE-2025-40035
 Redhat
                        Redhat