{"api_version":"1","generated_at":"2026-05-13T22:46:13+00:00","cve":"CVE-2026-43317","urls":{"html":"https://cve.report/CVE-2026-43317","api":"https://cve.report/api/cve/CVE-2026-43317.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-43317","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-43317"},"summary":{"title":"most: core: fix leak on early registration failure","description":"In the Linux kernel, the following vulnerability has been resolved:\n\nmost: core: fix leak on early registration failure\n\nA recent commit fixed a resource leak on early registration failures but\nfor some reason left out the first error path which still leaks the\nresources associated with the interface.\n\nFix up also the first error path so that the interface is always\nreleased on errors.","state":"PUBLISHED","assigner":"Linux","published_at":"2026-05-08 14:16:40","updated_at":"2026-05-12 14:10:27"},"problem_types":[],"metrics":[],"references":[{"url":"https://git.kernel.org/stable/c/f1ba620f9e8d7291f80c0554e4b820f5fb30e819","name":"https://git.kernel.org/stable/c/f1ba620f9e8d7291f80c0554e4b820f5fb30e819","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/5fd4396c2e48e90cc2597a86c18227d56ea845f0","name":"https://git.kernel.org/stable/c/5fd4396c2e48e90cc2597a86c18227d56ea845f0","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/bbfe49ffb892bddf32c34bea95b7ff0fc30affb5","name":"https://git.kernel.org/stable/c/bbfe49ffb892bddf32c34bea95b7ff0fc30affb5","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/2c198c272f9c9213b0fdf6b4a879f445c574f416","name":"https://git.kernel.org/stable/c/2c198c272f9c9213b0fdf6b4a879f445c574f416","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-43317","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-43317","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 723de0f9171eeb49a3ae98cae82ebbbb992b3a7c bbfe49ffb892bddf32c34bea95b7ff0fc30affb5 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 723de0f9171eeb49a3ae98cae82ebbbb992b3a7c f1ba620f9e8d7291f80c0554e4b820f5fb30e819 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 723de0f9171eeb49a3ae98cae82ebbbb992b3a7c 5fd4396c2e48e90cc2597a86c18227d56ea845f0 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 723de0f9171eeb49a3ae98cae82ebbbb992b3a7c 2c198c272f9c9213b0fdf6b4a879f445c574f416 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 5.6","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.6 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.12.75 6.12.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.18.16 6.18.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.19.6 6.19.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 7.0 * original_commit_for_fix","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"43317","cve":"CVE-2026-43317","epss":"0.000180000","percentile":"0.047270000","score_date":"2026-05-12","updated_at":"2026-05-13 00:11:53"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["drivers/most/core.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"bbfe49ffb892bddf32c34bea95b7ff0fc30affb5","status":"affected","version":"723de0f9171eeb49a3ae98cae82ebbbb992b3a7c","versionType":"git"},{"lessThan":"f1ba620f9e8d7291f80c0554e4b820f5fb30e819","status":"affected","version":"723de0f9171eeb49a3ae98cae82ebbbb992b3a7c","versionType":"git"},{"lessThan":"5fd4396c2e48e90cc2597a86c18227d56ea845f0","status":"affected","version":"723de0f9171eeb49a3ae98cae82ebbbb992b3a7c","versionType":"git"},{"lessThan":"2c198c272f9c9213b0fdf6b4a879f445c574f416","status":"affected","version":"723de0f9171eeb49a3ae98cae82ebbbb992b3a7c","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["drivers/most/core.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"5.6"},{"lessThan":"5.6","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"6.12.*","status":"unaffected","version":"6.12.75","versionType":"semver"},{"lessThanOrEqual":"6.18.*","status":"unaffected","version":"6.18.16","versionType":"semver"},{"lessThanOrEqual":"6.19.*","status":"unaffected","version":"6.19.6","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"7.0","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.12.75","versionStartIncluding":"5.6","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.18.16","versionStartIncluding":"5.6","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.19.6","versionStartIncluding":"5.6","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0","versionStartIncluding":"5.6","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nmost: core: fix leak on early registration failure\n\nA recent commit fixed a resource leak on early registration failures but\nfor some reason left out the first error path which still leaks the\nresources associated with the interface.\n\nFix up also the first error path so that the interface is always\nreleased on errors."}],"providerMetadata":{"dateUpdated":"2026-05-11T22:22:13.350Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/bbfe49ffb892bddf32c34bea95b7ff0fc30affb5"},{"url":"https://git.kernel.org/stable/c/f1ba620f9e8d7291f80c0554e4b820f5fb30e819"},{"url":"https://git.kernel.org/stable/c/5fd4396c2e48e90cc2597a86c18227d56ea845f0"},{"url":"https://git.kernel.org/stable/c/2c198c272f9c9213b0fdf6b4a879f445c574f416"}],"title":"most: core: fix leak on early registration failure","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2026-43317","datePublished":"2026-05-08T13:26:12.899Z","dateReserved":"2026-05-01T14:12:56.001Z","dateUpdated":"2026-05-11T22:22:13.350Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-08 14:16:40","lastModifiedDate":"2026-05-12 14:10:27","problem_types":[],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"43317","Ordinal":"1","Title":"most: core: fix leak on early registration failure","CVE":"CVE-2026-43317","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"43317","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\nmost: core: fix leak on early registration failure\n\nA recent commit fixed a resource leak on early registration failures but\nfor some reason left out the first error path which still leaks the\nresources associated with the interface.\n\nFix up also the first error path so that the interface is always\nreleased on errors.","Type":"Description","Title":"most: core: fix leak on early registration failure"}]}}}