Description
In the Linux kernel, the following vulnerability has been resolved: Input: imx_sc_key - fix memory corruption on unload This is supposed to be "priv" but we accidentally pass "&priv" which is an address in the stack and so it will lead to memory corruption when the imx_sc_key_action() function is called. Remove the &.
Product status
768062fd1284529212daffd360314e9aa93abb62 (git) before ca9a08de9b294422376f47ade323d69590dbc6f2
768062fd1284529212daffd360314e9aa93abb62 (git) before 56881294915a6e866d31a46f9bcb5e19167cfbaa
768062fd1284529212daffd360314e9aa93abb62 (git) before 6524a15d33951b18ac408ebbcb9c16e14e21c336
768062fd1284529212daffd360314e9aa93abb62 (git) before d83f1512758f4ef6fc5e83219fe7eeeb6b428ea4
5.8
Any version before 5.8
6.6.118 (semver)
6.12.60 (semver)
6.17.10 (semver)
6.18 (original_commit_for_fix)
References
git.kernel.org/...c/ca9a08de9b294422376f47ade323d69590dbc6f2
git.kernel.org/...c/56881294915a6e866d31a46f9bcb5e19167cfbaa
git.kernel.org/...c/6524a15d33951b18ac408ebbcb9c16e14e21c336
git.kernel.org/...c/d83f1512758f4ef6fc5e83219fe7eeeb6b428ea4