CVE-2025-40062
- Published: 1761653740
- Last modified: 1761653740
CVE-2025-40062 — In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/qm - set NULL to qm->debug.qm_diff_regs When the initialization of qm->debug.acc_diff_reg fails, the probe process does not exit. However, after qm->debug.qm_diff_regs is freed, it is not set to NULL. This can lead to a double free when the remove…
Related CVE by CWE
No related CWE found.
Top CVE for Vendor
No vendor taxonomy on this entry.
Recently Exploited Similar Vulnerabilities
No recent KEV-listed items for this vendor/product.
In the Linux kernel, the following vulnerability has been resolved:
crypto: hisilicon/qm – set NULL to qm->debug.qm_diff_regs
When the initialization of qm->debug.acc_diff_reg fails,
the probe process does not exit. However, after qm->debug.qm_diff_regs is
freed, it is not set to NULL. This can lead to a double free when the
remove process attempts to free it again. Therefore, qm->debug.qm_diff_regs
should be set to NULL after it is freed.
🧠 Explainer: What this vulnerability means
Summary: A flaw in the product from the vendor (CWE: unspecified) can be exploited.
Impact: Attackers could gain unauthorized access, execute code, or disrupt services.
Mitigation: Until patched, restrict exposure, enforce least privilege, and monitor for suspicious activity.
No vendor/product data yet.
No explicit mitigation/advisory links found in references.