CVE-2025-40262

In the Linux kernel, the following vulnerability has been resolved:

Input: imx_sc_key – fix memory corruption on unload

This is supposed to be “priv” but we accidentally pass “&priv” which is
an address in the stack and so it will lead to memory corruption when
the imx_sc_key_action() function is called. Remove the &.

More information : https://git.kernel.org/stable/c/3e96803b169dc948847f0fc2bae729a80914eb7b