Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2884 articles · 109723 vulns · 38/41 feeds (7d)
← Back to list
5.5
CVE-2025-21859PATCHED
linux · linux_kernel

In the Linux kernel, the following vulnerability has been resolved: USB: gadget: f_midi: f_midi_complete to call queue_work When using USB MIDI, a lock is attempted to be acquired twice through a re

Description

In the Linux kernel, the following vulnerability has been resolved: USB: gadget: f_midi: f_midi_complete to call queue_work When using USB MIDI, a lock is attempted to be acquired twice through a re-entrant call to f_midi_transmit, causing a deadlock. Fix it by using queue_work() to schedule the inner f_midi_transmit() via a high priority work queue from the completion handler.

Affected Products

VendorProductVersions
linuxlinux_kernel< 6.1.130, < 6.6.80, < 6.12.17, < 6.13.5

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
amazonamazon linuxcert_advisory90%
canonicalubuntu linuxcert_advisory90%
debiandebian linuxcert_advisory90%
googlegoogle container-optimized oscert_advisory90%
open sourceopen source linux kernelcert_advisory90%

References

  • https://git.kernel.org/stable/c/1f10923404705a94891e612dff3b75e828a78368(Patch)
  • https://git.kernel.org/stable/c/24a942610ee9bafb2692a456ae850c5b2e409b05(Patch)
  • https://git.kernel.org/stable/c/4ab37fcb42832cdd3e9d5e50653285ca84d6686f(Patch)
  • https://git.kernel.org/stable/c/727dee0857946b85232526de4f5a957fe163e89a(Patch)
  • https://git.kernel.org/stable/c/8aa6b4be1f4efccbfc533e6ec8841d26e4fa8dba(Patch)
  • https://git.kernel.org/stable/c/b09957657d7767d164b3432af2129bd72947553c(Patch)
  • https://git.kernel.org/stable/c/deeee3adb2c01eedab32c3b4519337689ad02e8a(Patch)
  • https://git.kernel.org/stable/c/e9fec6f42c45db2f62dc373fb1a10d2488c04e79(Patch)
  • https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
  • https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html

Related News (1 articles)

Tier B
BSI Advisories2h ago
[UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
→ No new info (linked only)
CVSS 3.15.5 MEDIUM
VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CISA KEV❌ No
Actively exploited❌ No
Patch available
6.1.1306.6.806.12.176.13.5
CWECWE-667, CWE-667
PublishedMar 12, 2025
Last enriched8d ago
Trending Score23
Source articles1
Independent1
Info Completeness9/14
Missing: epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-23400EXP
In the Linux kernel, the following vulnerability has been resolved: rust_binder: call set_notification_done() without proc lock Consider the following sequence of events on a death listener: 1. The
Trending: 65
HIGHCVE-2026-23406EXP
apparmor: fix side-effect bug in match_char() macro usage
Trending: 62
HIGHCVE-2026-23398EXP
In the Linux kernel, the following vulnerability has been resolved: icmp: fix NULL pointer dereference in icmp_tag_validation() icmp_tag_validation() unconditionally dereferences the result of rcu_d
Trending: 61
NONECVE-2026-31410EXP
ksmbd: use volume UUID in FS_OBJECT_ID_INFORMATION
Trending: 34
NONECVE-2026-31411
net: atm: fix crash due to unvalidated vcc pointer in sigd_send()
Trending: 33

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Vulnerability Timeline

CVE Published
Mar 12, 2025
Patch Available
Nov 3, 2025
Discovered by ZDM
Apr 1, 2026