๐Ÿ” CVE Alert

CVE-2025-21859

MEDIUM 5.5

USB: gadget: f_midi: f_midi_complete to call queue_work

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: USB: gadget: f_midi: f_midi_complete to call queue_work When using USB MIDI, a lock is attempted to be acquired twice through a re-entrant call to f_midi_transmit, causing a deadlock. Fix it by using queue_work() to schedule the inner f_midi_transmit() via a high priority work queue from the completion handler.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Mar 12, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
d5daf49b58661ec4af7a55b277176efbf945ca05 < 727dee0857946b85232526de4f5a957fe163e89a d5daf49b58661ec4af7a55b277176efbf945ca05 < 1f10923404705a94891e612dff3b75e828a78368 d5daf49b58661ec4af7a55b277176efbf945ca05 < b09957657d7767d164b3432af2129bd72947553c d5daf49b58661ec4af7a55b277176efbf945ca05 < 24a942610ee9bafb2692a456ae850c5b2e409b05 d5daf49b58661ec4af7a55b277176efbf945ca05 < deeee3adb2c01eedab32c3b4519337689ad02e8a d5daf49b58661ec4af7a55b277176efbf945ca05 < e9fec6f42c45db2f62dc373fb1a10d2488c04e79 d5daf49b58661ec4af7a55b277176efbf945ca05 < 8aa6b4be1f4efccbfc533e6ec8841d26e4fa8dba d5daf49b58661ec4af7a55b277176efbf945ca05 < 4ab37fcb42832cdd3e9d5e50653285ca84d6686f
Linux / Linux
3.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/727dee0857946b85232526de4f5a957fe163e89a git.kernel.org: https://git.kernel.org/stable/c/1f10923404705a94891e612dff3b75e828a78368 git.kernel.org: https://git.kernel.org/stable/c/b09957657d7767d164b3432af2129bd72947553c git.kernel.org: https://git.kernel.org/stable/c/24a942610ee9bafb2692a456ae850c5b2e409b05 git.kernel.org: https://git.kernel.org/stable/c/deeee3adb2c01eedab32c3b4519337689ad02e8a git.kernel.org: https://git.kernel.org/stable/c/e9fec6f42c45db2f62dc373fb1a10d2488c04e79 git.kernel.org: https://git.kernel.org/stable/c/8aa6b4be1f4efccbfc533e6ec8841d26e4fa8dba git.kernel.org: https://git.kernel.org/stable/c/4ab37fcb42832cdd3e9d5e50653285ca84d6686f lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html