{"id":"CVE-2025-68249","summary":"most: usb: hdm_probe: Fix calling put_device() before device initialization","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmost: usb: hdm_probe: Fix calling put_device() before device initialization\n\nThe early error path in hdm_probe() can jump to err_free_mdev before\n&mdev-\u003edev has been initialized with device_initialize(). Calling\nput_device(&mdev-\u003edev) there triggers a device core WARN and ends up\ninvoking kref_put(&kobj-\u003ekref, kobject_release) on an uninitialized\nkobject.\n\nIn this path the private struct was only kmalloc'ed and the intended\nrelease is effectively kfree(mdev) anyway, so free it directly instead\nof calling put_device() on an uninitialized device.\n\nThis removes the WARNING and fixes the pre-initialization error path.","modified":"2026-03-31T17:29:38.583457Z","published":"2025-12-16T14:32:16.370Z","related":["SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0293-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:20207-1","SUSE-SU-2026:20220-1","SUSE-SU-2026:20228-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","openSUSE-SU-2026:20145-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68249.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3509c748e79435d09e730673c8c100b7f0ebc87c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4af0eedbdb4df7936bf43a28e31af232744d2620"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6fb8fbc0aa542af5bf0fed94fa6b0edf18144f95"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7d851f746067b8ee5bac9c262f326ace0a6ea253"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a8cc9e5fcb0e2eef21513a4fec888f5712cb8162"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ad2be44882716dc3589fbc5572cc13f88ead6b24"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c400410fe0580dd6118ae8d60287ac9ce71a65fd"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68249.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68249"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"97a6f772f36b7f52bcfa56a581bbd2470cffe23d"},{"fixed":"3509c748e79435d09e730673c8c100b7f0ebc87c"},{"fixed":"ad2be44882716dc3589fbc5572cc13f88ead6b24"},{"fixed":"c400410fe0580dd6118ae8d60287ac9ce71a65fd"},{"fixed":"6fb8fbc0aa542af5bf0fed94fa6b0edf18144f95"},{"fixed":"7d851f746067b8ee5bac9c262f326ace0a6ea253"},{"fixed":"4af0eedbdb4df7936bf43a28e31af232744d2620"},{"fixed":"a8cc9e5fcb0e2eef21513a4fec888f5712cb8162"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68249.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.9.0"},{"fixed":"5.10.246"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.196"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.158"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.115"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.56"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.6"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68249.json"}}],"schema_version":"1.7.5"}