CVE-2025-68172

In the Linux kernel, the following vulnerability has been resolved:

crypto: aspeed – fix double free caused by devm

The clock obtained via devm_clk_get_enabled() is automatically managed
by devres and will be disabled and freed on driver detach. Manually
calling clk_disable_unprepare() in error path and remove function
causes double free.

Remove the manual clock cleanup in both aspeed_acry_probe()’s error
path and aspeed_acry_remove().

More information : https://git.kernel.org/stable/c/0dd6474ced33489076e6c0f3fe5077bf12e85b28