Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: crypto: aspeed - fix double free caused by devm The clock obtained via devm_clk_get_enabled() is automatically managed by devres and will be disabled and freed on driver detach. Manually calling clk_disable_unprepare() in error path and remove function causes double free. Remove the manual clock cleanup in both aspeed_acry_probe()'s error path and aspeed_acry_remove().
References
- https://git.kernel.org/stable/c/0dd6474ced33489076e6c0f3fe5077bf12e85b28
- https://git.kernel.org/stable/c/29d0504077044a7e1ffbd09a6118018d5954a6e5
- https://git.kernel.org/stable/c/3c9bf72cc1ced1297b235f9422d62b613a3fdae9
- https://git.kernel.org/stable/c/e8407dfd267018f4647ffb061a9bd4a6d7ebacc6
FAQ
What is CVE-2025-68172?
CVE-2025-68172 is a documented vulnerability. In the Linux kernel, the following vulnerability has been resolved: crypto: aspeed - fix double free caused by devm The clock obtained via devm_clk_get_enabled() is automatically managed by devres a...
How severe is CVE-2025-68172?
CVSS scoring is not yet available for CVE-2025-68172. Check NVD for updates.
Is there a patch for CVE-2025-68172?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.