Home

Description

In the Linux kernel, the following vulnerability has been resolved: Input: imx_sc_key - fix memory corruption on unload This is supposed to be "priv" but we accidentally pass "&priv" which is an address in the stack and so it will lead to memory corruption when the imx_sc_key_action() function is called. Remove the &.

PUBLISHED Reserved 2025-04-16 | Published 2025-12-04 | Updated 2025-12-04 | Assigner Linux

Product status

Default status
unaffected

768062fd1284529212daffd360314e9aa93abb62 (git) before ca9a08de9b294422376f47ade323d69590dbc6f2
affected

768062fd1284529212daffd360314e9aa93abb62 (git) before 56881294915a6e866d31a46f9bcb5e19167cfbaa
affected

768062fd1284529212daffd360314e9aa93abb62 (git) before 6524a15d33951b18ac408ebbcb9c16e14e21c336
affected

768062fd1284529212daffd360314e9aa93abb62 (git) before d83f1512758f4ef6fc5e83219fe7eeeb6b428ea4
affected

Default status
affected

5.8
affected

Any version before 5.8
unaffected

6.6.118 (semver)
unaffected

6.12.60 (semver)
unaffected

6.17.10 (semver)
unaffected

6.18 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/ca9a08de9b294422376f47ade323d69590dbc6f2

git.kernel.org/...c/56881294915a6e866d31a46f9bcb5e19167cfbaa

git.kernel.org/...c/6524a15d33951b18ac408ebbcb9c16e14e21c336

git.kernel.org/...c/d83f1512758f4ef6fc5e83219fe7eeeb6b428ea4

cve.org (CVE-2025-40262)

nvd.nist.gov (CVE-2025-40262)