In the Linux kernel, the following vulnerability has been resolved:
pmdomain: arm: scmi: Fix genpd leak on provider registration failure
If ofgenpdaddprovideronecell() fails during probe, the previously created generic power domains are not removed, leading to a memory leak and potential kernel crash later in genpddebugadd().
Add proper error handling to unwind the initialized domains before returning from probe to ensure all resources are correctly released on failure.
Example crash trace observed without this fix:
| Unable to handle kernel paging request at virtual address fffffffffffffc70 | CPU: 1 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.18.0-rc1 #405 PREEMPT | Hardware name: ARM LTD ARM Juno Development Platform/ARM Juno Development Platform | pstate: 00000005 (nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) | pc : genpddebugadd+0x2c/0x160 | lr : genpddebuginit+0x74/0x98 | Call trace: | genpddebugadd+0x2c/0x160 (P) | genpddebuginit+0x74/0x98 | dooneinitcall+0xd0/0x2d8 | doinitcalllevel+0xa0/0x140 | doinitcalls+0x60/0xa8 | dobasicsetup+0x28/0x40 | kernelinitfreeable+0xe8/0x170 | kernelinit+0x2c/0x140 | retfromfork+0x10/0x20
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68204.json",
"cna_assigner": "Linux"
}