In the Linux kernel, the following vulnerability has been resolved:
Input: imxsckey - fix memory corruption on unload
This is supposed to be "priv" but we accidentally pass "&priv" which is an address in the stack and so it will lead to memory corruption when the imxsckey_action() function is called. Remove the &.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40262.json",
"cna_assigner": "Linux"
}