In the Linux kernel, the following vulnerability has been resolved:
crypto: hisilicon/qm - set NULL to qm->debug.qm_diff_regs
When the initialization of qm->debug.acc_diff_reg fails,
the probe process does not exit. However, after qm->debug.qm_diff_regs is
freed, it is not set to NULL. This can lead to a double free when the
remove process attempts to free it again. Therefore, qm->debug.qm_diff_regs
should be set to NULL after it is freed.
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 29 Oct 2025 11:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Linux Linux linux Kernel | |
| Vendors & Products | Linux Linux linux Kernel | 
Wed, 29 Oct 2025 00:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | |
| Metrics | threat_severity 
 | cvssV3_1 
 
 | 
Tue, 28 Oct 2025 12:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/qm - set NULL to qm->debug.qm_diff_regs When the initialization of qm->debug.acc_diff_reg fails, the probe process does not exit. However, after qm->debug.qm_diff_regs is freed, it is not set to NULL. This can lead to a double free when the remove process attempts to free it again. Therefore, qm->debug.qm_diff_regs should be set to NULL after it is freed. | |
| Title | crypto: hisilicon/qm - set NULL to qm->debug.qm_diff_regs | |
| References |  | 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-10-28T11:48:33.961Z
Reserved: 2025-04-16T07:20:57.158Z
Link: CVE-2025-40062
 Vulnrichment
                        Vulnrichment
                    No data.
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-10-28T12:15:40.610
Modified: 2025-10-30T15:05:32.197
Link: CVE-2025-40062
 Redhat
                        Redhat