In the Linux kernel, the following vulnerability has been resolved:
crypto: aspeed - fix double free caused by devm
The clock obtained via devmclkgetenabled() is automatically managed by devres and will be disabled and freed on driver detach. Manually calling clkdisable_unprepare() in error path and remove function causes double free.
Remove the manual clock cleanup in both aspeedacryprobe()'s error path and aspeedacryremove().
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68172.json",
"cna_assigner": "Linux"
}