Home

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: aspeed - fix double free caused by devm The clock obtained via devm_clk_get_enabled() is automatically managed by devres and will be disabled and freed on driver detach. Manually calling clk_disable_unprepare() in error path and remove function causes double free. Remove the manual clock cleanup in both aspeed_acry_probe()'s error path and aspeed_acry_remove().

PUBLISHED Reserved 2025-12-16 | Published 2025-12-16 | Updated 2025-12-16 | Assigner Linux

Product status

Default status
unaffected

2f1cf4e50c956f882c9fc209c7cded832b67b8a3 (git) before 0dd6474ced33489076e6c0f3fe5077bf12e85b28
affected

2f1cf4e50c956f882c9fc209c7cded832b67b8a3 (git) before 29d0504077044a7e1ffbd09a6118018d5954a6e5
affected

2f1cf4e50c956f882c9fc209c7cded832b67b8a3 (git) before e8407dfd267018f4647ffb061a9bd4a6d7ebacc6
affected

2f1cf4e50c956f882c9fc209c7cded832b67b8a3 (git) before 3c9bf72cc1ced1297b235f9422d62b613a3fdae9
affected

Default status
affected

6.3
affected

Any version before 6.3
unaffected

6.6.117 (semver)
unaffected

6.12.58 (semver)
unaffected

6.17.8 (semver)
unaffected

6.18 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/0dd6474ced33489076e6c0f3fe5077bf12e85b28

git.kernel.org/...c/29d0504077044a7e1ffbd09a6118018d5954a6e5

git.kernel.org/...c/e8407dfd267018f4647ffb061a9bd4a6d7ebacc6

git.kernel.org/...c/3c9bf72cc1ced1297b235f9422d62b613a3fdae9

cve.org (CVE-2025-68172)

nvd.nist.gov (CVE-2025-68172)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.