CVE-2025-40263
Linux Debian vulnerability analysis and mitigation

In the Linux kernel, the following vulnerability has been resolved:

Input: cros_ec_keyb - fix an invalid memory access

If cros_ec_keyb_register_matrix() isn't called (due to buttons_switches_only) in cros_ec_keyb_probe(), ckdev->idev remains NULL. An invalid memory access is observed in cros_ec_keyb_process() when receiving an EC_MKBP_EVENT_KEY_MATRIX event in cros_ec_keyb_work() in such case.

Unable to handle kernel read from unreadable memory at virtual address 0000000000000028 ... x3 : 0000000000000000 x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: input_event cros_ec_keyb_work blocking_notifier_call_chain ec_irq_thread

It's still unknown about why the kernel receives such malformed event, in any cases, the kernel shouldn't access ckdev->idev and friends if the driver doesn't intend to initialize them.


SourceNVD

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-0821MEDIUM6.9
  • Linux DebianLinux Debian
  • quickjs
NoNoJan 10, 2026
CVE-2026-22703MEDIUM5.5
  • Linux DebianLinux Debian
  • cosign
NoNoJan 10, 2026
CVE-2026-0822MEDIUM5.3
  • Linux DebianLinux Debian
  • quickjs
NoNoJan 10, 2026
CVE-2025-15506MEDIUM4.8
  • Linux DebianLinux Debian
  • opencolorio
NoNoJan 11, 2026
CVE-2026-22702MEDIUM4.5
  • Linux DebianLinux Debian
  • python-virtualenv
NoNoJan 10, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management