CVE-2025-40262
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
04/12/2025
Última modificación:
04/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
Input: imx_sc_key - fix memory corruption on unload<br />
<br />
This is supposed to be "priv" but we accidentally pass "&priv" which is<br />
an address in the stack and so it will lead to memory corruption when<br />
the imx_sc_key_action() function is called. Remove the &.



