CVE-2025-40262
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
04/12/2025
Última modificación:
06/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
Input: imx_sc_key - fix memory corruption on unload<br />
<br />
This is supposed to be "priv" but we accidentally pass "&priv" which is<br />
an address in the stack and so it will lead to memory corruption when<br />
the imx_sc_key_action() function is called. Remove the &.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/3e96803b169dc948847f0fc2bae729a80914eb7b
- https://git.kernel.org/stable/c/4ce5218b101205b3425099fe3df88a61b58f9cc2
- https://git.kernel.org/stable/c/56881294915a6e866d31a46f9bcb5e19167cfbaa
- https://git.kernel.org/stable/c/6524a15d33951b18ac408ebbcb9c16e14e21c336
- https://git.kernel.org/stable/c/a155292c3ce722036014da5477ee0e4c87b5e6b3
- https://git.kernel.org/stable/c/ca9a08de9b294422376f47ade323d69590dbc6f2
- https://git.kernel.org/stable/c/d83f1512758f4ef6fc5e83219fe7eeeb6b428ea4



