CVE-2025-40262
In the Linux kernel, the following vulnerability has been resolved:
Input: imx_sc_key – fix memory corruption on unload
This is supposed to be “priv” but we accidentally pass “&priv” which is
an address in the stack and so it will lead to memory corruption when
the imx_sc_key_action() function is called. Remove the &.
More information : https://git.kernel.org/stable/c/3e96803b169dc948847f0fc2bae729a80914eb7b
