๐Ÿ” CVE Alert

CVE-2025-21838

UNKNOWN 0.0

usb: gadget: core: flush gadget workqueue after device removal

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: core: flush gadget workqueue after device removal device_del() can lead to new work being scheduled in gadget->work workqueue. This is observed, for example, with the dwc3 driver with the following call stack: device_del() gadget_unbind_driver() usb_gadget_disconnect_locked() dwc3_gadget_pullup() dwc3_gadget_soft_disconnect() usb_gadget_set_state() schedule_work(&gadget->work) Move flush_work() after device_del() to ensure the workqueue is cleaned up.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Mar 7, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
5702f75375aa9ecf8ad3431aef3fe6ce8c8dbd15 < e3bc1a9a67ce33a2e761e6e7b7c2afc6cb9b7266 5702f75375aa9ecf8ad3431aef3fe6ce8c8dbd15 < 859cb45aefa6de823b2fa7f229fe6d9562c9f3b7 5702f75375aa9ecf8ad3431aef3fe6ce8c8dbd15 < f894448f3904d7ad66fecef8f01fe0172629e091 5702f75375aa9ecf8ad3431aef3fe6ce8c8dbd15 < 97695b5a1b5467a4f91194db12160f56da445dfe 5702f75375aa9ecf8ad3431aef3fe6ce8c8dbd15 < 399a45e5237ca14037120b1b895bd38a3b4492ea
Linux / Linux
3.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/e3bc1a9a67ce33a2e761e6e7b7c2afc6cb9b7266 git.kernel.org: https://git.kernel.org/stable/c/859cb45aefa6de823b2fa7f229fe6d9562c9f3b7 git.kernel.org: https://git.kernel.org/stable/c/f894448f3904d7ad66fecef8f01fe0172629e091 git.kernel.org: https://git.kernel.org/stable/c/97695b5a1b5467a4f91194db12160f56da445dfe git.kernel.org: https://git.kernel.org/stable/c/399a45e5237ca14037120b1b895bd38a3b4492ea lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html