Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-40262

Опубликовано: 04 дек. 2025
Источник: debian
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: Input: imx_sc_key - fix memory corruption on unload This is supposed to be "priv" but we accidentally pass "&priv" which is an address in the stack and so it will lead to memory corruption when the imx_sc_key_action() function is called. Remove the &.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.17.10-1package
linuxfixed6.12.63-1trixiepackage
linuxfixed6.1.159-1bookwormpackage

Примечания

  • https://git.kernel.org/linus/d83f1512758f4ef6fc5e83219fe7eeeb6b428ea4 (6.18-rc7)

EPSS

Процентиль: 16%
0.00051
Низкий

Связанные уязвимости

ubuntu
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: Input: imx_sc_key - fix memory corruption on unload This is supposed to be "priv" but we accidentally pass "&priv" which is an address in the stack and so it will lead to memory corruption when the imx_sc_key_action() function is called. Remove the &.

nvd
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: Input: imx_sc_key - fix memory corruption on unload This is supposed to be "priv" but we accidentally pass "&priv" which is an address in the stack and so it will lead to memory corruption when the imx_sc_key_action() function is called. Remove the &.

msrc
2 месяца назад

Input: imx_sc_key - fix memory corruption on unload

github
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: Input: imx_sc_key - fix memory corruption on unload This is supposed to be "priv" but we accidentally pass "&priv" which is an address in the stack and so it will lead to memory corruption when the imx_sc_key_action() function is called. Remove the &.

CVSS3: 5.5
fstec
3 месяца назад

Уязвимость функции imx_sc_key_action() модуля drivers/input/keyboard/imx_sc_key.c драйвера клавиш системного контроллера imx_sc_key ядра операционной системы Linux, позволяющая нарушителю повредить память

EPSS

Процентиль: 16%
0.00051
Низкий