VYPR
Unrated severityNVD Advisory· Published Dec 4, 2025· Updated Apr 15, 2026

CVE-2025-40223

CVE-2025-40223

Description

In the Linux kernel, the following vulnerability has been resolved:

most: usb: Fix use-after-free in hdm_disconnect

hdm_disconnect() calls most_deregister_interface(), which eventually unregisters the MOST interface device with device_unregister(iface->dev). If that drops the last reference, the device core may call release_mdev() immediately while hdm_disconnect() is still executing.

The old code also freed several mdev-owned allocations in hdm_disconnect() and then performed additional put_device() calls. Depending on refcount order, this could lead to use-after-free or double-free when release_mdev() ran (or when unregister paths also performed puts).

Fix by moving the frees of mdev-owned allocations into release_mdev(), so they happen exactly once when the device is truly released, and by dropping the extra put_device() calls in hdm_disconnect() that are redundant after device_unregister() and most_deregister_interface().

This addresses the KASAN slab-use-after-free reported by syzbot in hdm_disconnect(). See report and stack traces in the bug link below.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Use-after-free in Linux kernel MOST USB driver due to improper device lifecycle in hdm_disconnect, fixed by moving frees to release_mdev.

Vulnerability

Description

CVE-2025-40223 is a use-after-free vulnerability in the Linux kernel's MOST (Media Oriented Systems Transport) USB driver. The bug resides in the hdm_disconnect() function, which calls most_deregister_interface(), eventually triggering device_unregister(iface->dev). If that operation drops the last reference, the device core may invoke release_mdev() immediately while hdm_disconnect() is still executing. The old code freed several mdev-owned allocations in hdm_disconnect() and then performed additional put_device() calls, leading to use-after-free or double-free conditions when release_mdev() ran [1][2][3].

Exploitation

An attacker with physical access or ability to trigger device disconnection can exploit this race condition. The vulnerability requires no authentication and can be triggered by unplugging a USB MOST device or causing a disconnect event. The use-after-free occurs in kernel context, making it exploitable but requiring precise timing.

Impact

Successful exploitation could lead to local privilege escalation (LPE) or denial of service (DoS). An attacker able to control the freed memory could potentially execute arbitrary code in kernel space. The vulnerability has been reported by syzbot with KASAN slab-use-after-free reports [1].

Mitigation

The fix moves the freeing of mdev-owned allocations into release_mdev(), ensuring they happen exactly once when the device is truly released, and removes redundant put_device() calls in hdm_disconnect(). Patches are available in the stable kernel trees [1][2][3]. Users should apply the latest stable kernel updates to mitigate this vulnerability.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)

Patches

7

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.