CVE-2025-40262
04.12.2025, 16:16
In the Linux kernel, the following vulnerability has been resolved: Input: imx_sc_key - fix memory corruption on unload This is supposed to be "priv" but we accidentally pass "&priv" which is an address in the stack and so it will lead to memory corruption when the imx_sc_key_action() function is called. Remove the &.Enginsight
Awaiting analysis
This vulnerability is currently awaiting analysis.
Debian Releases