Description
In the Linux kernel, the following vulnerability has been resolved: crypto: aspeed - fix double free caused by devm The clock obtained via devm_clk_get_enabled() is automatically managed by devres and will be disabled and freed on driver detach. Manually calling clk_disable_unprepare() in error path and remove function causes double free. Remove the manual clock cleanup in both aspeed_acry_probe()'s error path and aspeed_acry_remove().
Product status
2f1cf4e50c956f882c9fc209c7cded832b67b8a3 (git) before 0dd6474ced33489076e6c0f3fe5077bf12e85b28
2f1cf4e50c956f882c9fc209c7cded832b67b8a3 (git) before 29d0504077044a7e1ffbd09a6118018d5954a6e5
2f1cf4e50c956f882c9fc209c7cded832b67b8a3 (git) before e8407dfd267018f4647ffb061a9bd4a6d7ebacc6
2f1cf4e50c956f882c9fc209c7cded832b67b8a3 (git) before 3c9bf72cc1ced1297b235f9422d62b613a3fdae9
6.3
Any version before 6.3
6.6.117 (semver)
6.12.58 (semver)
6.17.8 (semver)
6.18 (original_commit_for_fix)
References
git.kernel.org/...c/0dd6474ced33489076e6c0f3fe5077bf12e85b28
git.kernel.org/...c/29d0504077044a7e1ffbd09a6118018d5954a6e5
git.kernel.org/...c/e8407dfd267018f4647ffb061a9bd4a6d7ebacc6
git.kernel.org/...c/3c9bf72cc1ced1297b235f9422d62b613a3fdae9
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.