VYPR
Unrated severityNVD Advisory· Published Dec 16, 2025· Updated Apr 15, 2026

CVE-2025-68172

CVE-2025-68172

Description

In the Linux kernel, the following vulnerability has been resolved:

crypto: aspeed - fix double free caused by devm

The clock obtained via devm_clk_get_enabled() is automatically managed by devres and will be disabled and freed on driver detach. Manually calling clk_disable_unprepare() in error path and remove function causes double free.

Remove the manual clock cleanup in both aspeed_acry_probe()'s error path and aspeed_acry_remove().

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Double free in Linux kernel's Aspeed crypto driver due to devm clock management; fix removes manual cleanup.

Root Cause: In the Aspeed crypto driver (aspeed_acry), the function aspeed_acry_probe() obtains a clock via devm_clk_get_enabled(), which is managed by devres and automatically freed on driver detach. However, the error path and the aspeed_acry_remove() function also call clk_disable_unprepare() manually, leading to a double free [1][2].

Attack Surface: The vulnerability exists in the kernel module. An attacker would need local access to the system to trigger the double free, possibly by causing a probe failure or unloading the module [1][2]. No special privileges are mentioned, but typical exploitation requires the ability to load/unload the driver or manipulate hardware.

Impact: A double free in the kernel can lead to memory corruption, system crash (denial of service), or potentially arbitrary code execution if an attacker can control the freed memory [1][2]. The severity is considered high.

Mitigation: The fix removes the redundant manual clock cleanup in both the probe error path and the remove function. The patches (commits e8407dfd2670 and 3c9bf72cc1ce) are included in the stable Linux kernel releases [1][2]. Users should update their kernel to a version containing these commits.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.