CVE-2025-40262

Source
https://cve.org/CVERecord?id=CVE-2025-40262
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40262.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-40262
Downstream
Related
Published
2025-12-04T16:08:22.043Z
Modified
2026-03-20T12:43:14.382785Z
Summary
Input: imx_sc_key - fix memory corruption on unload
Details

In the Linux kernel, the following vulnerability has been resolved:

Input: imxsckey - fix memory corruption on unload

This is supposed to be "priv" but we accidentally pass "&priv" which is an address in the stack and so it will lead to memory corruption when the imxsckey_action() function is called. Remove the &.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40262.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
768062fd1284529212daffd360314e9aa93abb62
Fixed
3e96803b169dc948847f0fc2bae729a80914eb7b
Fixed
4ce5218b101205b3425099fe3df88a61b58f9cc2
Fixed
a155292c3ce722036014da5477ee0e4c87b5e6b3
Fixed
ca9a08de9b294422376f47ade323d69590dbc6f2
Fixed
56881294915a6e866d31a46f9bcb5e19167cfbaa
Fixed
6524a15d33951b18ac408ebbcb9c16e14e21c336
Fixed
d83f1512758f4ef6fc5e83219fe7eeeb6b428ea4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40262.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.8.0
Fixed
5.10.247
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.197
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.159
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.118
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.60
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.17.10

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40262.json"