Количество 11
Количество 11
GHSA-2m33-w232-qf59
In the Linux kernel, the following vulnerability has been resolved: Input: imx_sc_key - fix memory corruption on unload This is supposed to be "priv" but we accidentally pass "&priv" which is an address in the stack and so it will lead to memory corruption when the imx_sc_key_action() function is called. Remove the &.
CVE-2025-40262
In the Linux kernel, the following vulnerability has been resolved: Input: imx_sc_key - fix memory corruption on unload This is supposed to be "priv" but we accidentally pass "&priv" which is an address in the stack and so it will lead to memory corruption when the imx_sc_key_action() function is called. Remove the &.
CVE-2025-40262
In the Linux kernel, the following vulnerability has been resolved: Input: imx_sc_key - fix memory corruption on unload This is supposed to be "priv" but we accidentally pass "&priv" which is an address in the stack and so it will lead to memory corruption when the imx_sc_key_action() function is called. Remove the &.
CVE-2025-40262
Input: imx_sc_key - fix memory corruption on unload
CVE-2025-40262
In the Linux kernel, the following vulnerability has been resolved: I ...
BDU:2025-15945
Уязвимость функции imx_sc_key_action() модуля drivers/input/keyboard/imx_sc_key.c драйвера клавиш системного контроллера imx_sc_key ядра операционной системы Linux, позволяющая нарушителю повредить память
openSUSE-SU-2026:20145-1
Security update for the Linux Kernel
SUSE-SU-2026:0293-1
Security update for the Linux Kernel
SUSE-SU-2026:0315-1
Security update for the Linux Kernel
SUSE-SU-2026:0281-1
Security update for the Linux Kernel
SUSE-SU-2026:0278-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-2m33-w232-qf59 In the Linux kernel, the following vulnerability has been resolved: Input: imx_sc_key - fix memory corruption on unload This is supposed to be "priv" but we accidentally pass "&priv" which is an address in the stack and so it will lead to memory corruption when the imx_sc_key_action() function is called. Remove the &. | 0% Низкий | 2 месяца назад | ||
CVE-2025-40262 In the Linux kernel, the following vulnerability has been resolved: Input: imx_sc_key - fix memory corruption on unload This is supposed to be "priv" but we accidentally pass "&priv" which is an address in the stack and so it will lead to memory corruption when the imx_sc_key_action() function is called. Remove the &. | 0% Низкий | 2 месяца назад | ||
CVE-2025-40262 In the Linux kernel, the following vulnerability has been resolved: Input: imx_sc_key - fix memory corruption on unload This is supposed to be "priv" but we accidentally pass "&priv" which is an address in the stack and so it will lead to memory corruption when the imx_sc_key_action() function is called. Remove the &. | 0% Низкий | 2 месяца назад | ||
CVE-2025-40262 Input: imx_sc_key - fix memory corruption on unload | 0% Низкий | 2 месяца назад | ||
CVE-2025-40262 In the Linux kernel, the following vulnerability has been resolved: I ... | 0% Низкий | 2 месяца назад | ||
BDU:2025-15945 Уязвимость функции imx_sc_key_action() модуля drivers/input/keyboard/imx_sc_key.c драйвера клавиш системного контроллера imx_sc_key ядра операционной системы Linux, позволяющая нарушителю повредить память | CVSS3: 5.5 | 0% Низкий | 3 месяца назад | |
openSUSE-SU-2026:20145-1 Security update for the Linux Kernel | 8 дней назад | |||
SUSE-SU-2026:0293-1 Security update for the Linux Kernel | 15 дней назад | |||
SUSE-SU-2026:0315-1 Security update for the Linux Kernel | 13 дней назад | |||
SUSE-SU-2026:0281-1 Security update for the Linux Kernel | 18 дней назад | |||
SUSE-SU-2026:0278-1 Security update for the Linux Kernel | 18 дней назад |
Уязвимостей на страницу