{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-71272","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2026-03-17T09:08:18.458Z","datePublished":"2026-05-06T11:27:05.998Z","dateUpdated":"2026-05-11T21:57:11.195Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:57:11.195Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nmost: core: fix resource leak in most_register_interface error paths\n\nThe function most_register_interface() did not correctly release resources\nif it failed early (before registering the device). In these cases, it\nreturned an error code immediately, leaking the memory allocated for the\ninterface.\n\nFix this by initializing the device early via device_initialize() and\ncalling put_device() on all error paths.\n\nThe most_register_interface() is expected to call put_device() on\nerror which frees the resources allocated in the caller. The\nput_device() either calls release_mdev() or dim2_release(),\ndepending on the caller.\n\nSwitch to using device_add() instead of device_register() to handle\nthe split initialization."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/most/core.c"],"versions":[{"version":"723de0f9171eeb49a3ae98cae82ebbbb992b3a7c","lessThan":"a49028a796d7b94f8e3ab9bd34b18f36be235459","status":"affected","versionType":"git"},{"version":"723de0f9171eeb49a3ae98cae82ebbbb992b3a7c","lessThan":"af0b99b2214a10554adb5b868240d23af6e64e71","status":"affected","versionType":"git"},{"version":"723de0f9171eeb49a3ae98cae82ebbbb992b3a7c","lessThan":"2f483f3817fb0e4209ac5de928778b1da0cc8574","status":"affected","versionType":"git"},{"version":"723de0f9171eeb49a3ae98cae82ebbbb992b3a7c","lessThan":"1f4c9d8a1021281750c6cda126d6f8a40cc24e71","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/most/core.c"],"versions":[{"version":"5.6","status":"affected"},{"version":"0","lessThan":"5.6","status":"unaffected","versionType":"semver"},{"version":"6.12.75","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.18.16","lessThanOrEqual":"6.18.*","status":"unaffected","versionType":"semver"},{"version":"6.19.6","lessThanOrEqual":"6.19.*","status":"unaffected","versionType":"semver"},{"version":"7.0","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.6","versionEndExcluding":"6.12.75"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.6","versionEndExcluding":"6.18.16"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.6","versionEndExcluding":"6.19.6"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.6","versionEndExcluding":"7.0"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/a49028a796d7b94f8e3ab9bd34b18f36be235459"},{"url":"https://git.kernel.org/stable/c/af0b99b2214a10554adb5b868240d23af6e64e71"},{"url":"https://git.kernel.org/stable/c/2f483f3817fb0e4209ac5de928778b1da0cc8574"},{"url":"https://git.kernel.org/stable/c/1f4c9d8a1021281750c6cda126d6f8a40cc24e71"}],"title":"most: core: fix resource leak in most_register_interface error paths","x_generator":{"engine":"bippy-1.2.0"}}}}