CVE-2025-40263 Affecting kernel-uek-debug-modules-wireless package, versions <0:6.12.0-108.64.6.3.el10uek


Severity

Recommended
high

Based on Oracle Linux security rating.

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ORACLE10-KERNELUEKDEBUGMODULESWIRELESS-15336826
  • published24 Feb 2026
  • disclosed4 Dec 2025

Introduced: 4 Dec 2025

CVE-2025-40263  (opens in a new tab)

How to fix?

Upgrade Oracle:10 kernel-uek-debug-modules-wireless to version 0:6.12.0-108.64.6.3.el10uek or higher.
This issue was patched in ELSA-2026-50112.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-uek-debug-modules-wireless package and not the kernel-uek-debug-modules-wireless package as distributed by Oracle. See How to fix? for Oracle:10 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

Input: cros_ec_keyb - fix an invalid memory access

If cros_ec_keyb_register_matrix() isn't called (due to buttons_switches_only) in cros_ec_keyb_probe(), ckdev-&gt;idev remains NULL. An invalid memory access is observed in cros_ec_keyb_process() when receiving an EC_MKBP_EVENT_KEY_MATRIX event in cros_ec_keyb_work() in such case.

Unable to handle kernel read from unreadable memory at virtual address 0000000000000028 ... x3 : 0000000000000000 x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: input_event cros_ec_keyb_work blocking_notifier_call_chain ec_irq_thread

It's still unknown about why the kernel receives such malformed event, in any cases, the kernel shouldn't access ckdev-&gt;idev and friends if the driver doesn't intend to initialize them.

CVSS Base Scores

version 3.1