CVE-2025-68172
In the Linux kernel, the following vulnerability has been resolved:
crypto: aspeed – fix double free caused by devm
The clock obtained via devm_clk_get_enabled() is automatically managed
by devres and will be disabled and freed on driver detach. Manually
calling clk_disable_unprepare() in error path and remove function
causes double free.
Remove the manual clock cleanup in both aspeed_acry_probe()’s error
path and aspeed_acry_remove().
More information : https://git.kernel.org/stable/c/0dd6474ced33489076e6c0f3fe5077bf12e85b28
