In the Linux kernel, the following vulnerability has been resolved:
crypto: hisilicon/qm - set NULL to qm->debug.qmdiffregs
When the initialization of qm->debug.accdiffreg fails, the probe process does not exit. However, after qm->debug.qmdiffregs is freed, it is not set to NULL. This can lead to a double free when the remove process attempts to free it again. Therefore, qm->debug.qmdiffregs should be set to NULL after it is freed.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40062.json",
"cna_assigner": "Linux"
}