CVE-2025-71272
Awaiting Analysis Awaiting Analysis - Queue
Resource Leak in Linux Kernel most_register_interface

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: most: core: fix resource leak in most_register_interface error paths The function most_register_interface() did not correctly release resources if it failed early (before registering the device). In these cases, it returned an error code immediately, leaking the memory allocated for the interface. Fix this by initializing the device early via device_initialize() and calling put_device() on all error paths. The most_register_interface() is expected to call put_device() on error which frees the resources allocated in the caller. The put_device() either calls release_mdev() or dim2_release(), depending on the caller. Switch to using device_add() instead of device_register() to handle the split initialization.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux_kernel linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's most_register_interface() function, where it fails to properly release allocated resources if an error occurs early in the process before the device is registered.

Specifically, when most_register_interface() encounters an error, it returns immediately without freeing the memory allocated for the interface, causing a resource (memory) leak.

The fix involves initializing the device early using device_initialize() and ensuring put_device() is called on all error paths to free resources. Additionally, the function now uses device_add() instead of device_register() to better handle initialization.


How can this vulnerability impact me? :

This vulnerability can lead to resource leaks in the Linux kernel, specifically memory leaks when the most_register_interface() function fails early.

Over time, these leaks could accumulate, potentially degrading system performance or causing instability due to exhausted memory resources.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update the Linux kernel to a version where the most_register_interface() function has been fixed. The fix involves proper resource management by initializing the device early with device_initialize(), using device_add() instead of device_register(), and ensuring put_device() is called on all error paths to prevent resource leaks.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart