CVE-2025-68754
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-05

Last updated on: 2026-01-08

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: rtc: amlogic-a4: fix double free caused by devm The clock obtained via devm_clk_get_enabled() is automatically managed by devres and will be disabled and freed on driver detach. Manually calling clk_disable_unprepare() in error path and remove function causes double free. Remove the redundant clk_disable_unprepare() calls from the probe error path and aml_rtc_remove(), allowing the devm framework to automatically manage the clock lifecycle.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-05
Last Modified
2026-01-08
Generated
2026-05-07
AI Q&A
2026-01-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
amlogic a4 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a double free issue in the Linux kernel's amlogic-a4 RTC driver. The problem occurs because the clock resource obtained via devm_clk_get_enabled() is automatically managed by the device resource management framework (devres), which disables and frees the clock on driver detach. However, the driver manually calls clk_disable_unprepare() in error paths and the remove function, leading to the clock being freed twice. The fix removes these redundant manual calls, allowing devres to manage the clock lifecycle properly.


How can this vulnerability impact me? :

This double free vulnerability can cause system instability or crashes due to improper resource management in the kernel driver. Double freeing memory or resources can lead to undefined behavior, including kernel panics or potential security risks such as denial of service.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update the Linux kernel to a version where the redundant clk_disable_unprepare() calls have been removed from the probe error path and aml_rtc_remove() function, allowing the devm framework to manage the clock lifecycle automatically.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart