Description
In the Linux kernel, the following vulnerability has been resolved:

most: core: fix resource leak in most_register_interface error paths

The function most_register_interface() did not correctly release resources
if it failed early (before registering the device). In these cases, it
returned an error code immediately, leaking the memory allocated for the
interface.

Fix this by initializing the device early via device_initialize() and
calling put_device() on all error paths.

The most_register_interface() is expected to call put_device() on
error which frees the resources allocated in the caller. The
put_device() either calls release_mdev() or dim2_release(),
depending on the caller.

Switch to using device_add() instead of device_register() to handle
the split initialization.
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the most_register_interface function of the Linux kernel. When registration fails early, the function returns an error without freeing memory allocated for the device interface, causing a resource leak. This leak can lead to exhaustion of system memory, potentially degrading performance or causing a denial-of-service condition. The flaw is a classic instance of CWE-400: Resource Manipulation or Release.

Affected Systems

All Linux kernel builds that contain the unpatched most_register_interface routine are affected. The patch was introduced in the commit series referenced in the advisory; any kernel version shipped before that commit is vulnerable. No specific version numbers are listed, so the impact applies to all kernels lacking the fix.

Risk and Exploitability

Based on the description, the vulnerability is a memory resource leak that occurs when most_register_interface() fails early and returns an error without freeing allocated memory. The incident does not specify any direct exploitation vector but the leak can accumulate over time, potentially exhausting memory and causing a denial-of-service. The analysis of the risk level is inferred from the nature of memory leaks; a system that repeatedly triggers this error path could suffer memory exhaustion, yet a single occurrence is unlikely to manifest a noticeable impact. Because the issuance includes no active exploitation reports, the EPSS score is not available and the vulnerability is not listed in KEV. The ultimate risk depends on workload characteristics and the likelihood of repeated failure, but no concrete evidence of exploitation is present.

Generated by OpenCVE AI on May 6, 2026 at 17:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that includes the most_register_interface patch commit
  • If an immediate kernel upgrade is not possible, rebuild the kernel with the latest upstream source that contains the fix
  • Temporarily disable or unload any kernel modules that invoke most_register_interface until the patched kernel is in place

Generated by OpenCVE AI on May 6, 2026 at 17:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 17:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-400

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: most: core: fix resource leak in most_register_interface error paths The function most_register_interface() did not correctly release resources if it failed early (before registering the device). In these cases, it returned an error code immediately, leaking the memory allocated for the interface. Fix this by initializing the device early via device_initialize() and calling put_device() on all error paths. The most_register_interface() is expected to call put_device() on error which frees the resources allocated in the caller. The put_device() either calls release_mdev() or dim2_release(), depending on the caller. Switch to using device_add() instead of device_register() to handle the split initialization.
Title most: core: fix resource leak in most_register_interface error paths
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:27:05.998Z

Reserved: 2026-03-17T09:08:18.458Z

Link: CVE-2025-71272

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:27.213

Modified: 2026-05-06T13:07:51.607

Link: CVE-2025-71272

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T17:15:08Z

Weaknesses