CVE-2025-21838

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: core: flush gadget workqueue after device removal device_del() can lead to new work being scheduled in gadget->work workqueue. This is observed, for example, with the dwc3 driver with the following call stack: device_del() gadget_unbind_driver() usb_gadget_disconnect_locked() dwc3_gadget_pullup() dwc3_gadget_soft_disconnect() usb_gadget_set_state() schedule_work(&gadget->work) Move flush_work() after device_del() to ensure the workqueue is cleaned up.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*

History

29 Oct 2025, 20:51

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/399a45e5237ca14037120b1b895bd38a3b4492ea - () https://git.kernel.org/stable/c/399a45e5237ca14037120b1b895bd38a3b4492ea - Patch
References () https://git.kernel.org/stable/c/859cb45aefa6de823b2fa7f229fe6d9562c9f3b7 - () https://git.kernel.org/stable/c/859cb45aefa6de823b2fa7f229fe6d9562c9f3b7 - Patch
References () https://git.kernel.org/stable/c/97695b5a1b5467a4f91194db12160f56da445dfe - () https://git.kernel.org/stable/c/97695b5a1b5467a4f91194db12160f56da445dfe - Patch
References () https://git.kernel.org/stable/c/e3bc1a9a67ce33a2e761e6e7b7c2afc6cb9b7266 - () https://git.kernel.org/stable/c/e3bc1a9a67ce33a2e761e6e7b7c2afc6cb9b7266 - Patch
References () https://git.kernel.org/stable/c/f894448f3904d7ad66fecef8f01fe0172629e091 - () https://git.kernel.org/stable/c/f894448f3904d7ad66fecef8f01fe0172629e091 - Patch
CWE NVD-CWE-noinfo
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*

07 Mar 2025, 18:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/e3bc1a9a67ce33a2e761e6e7b7c2afc6cb9b7266 -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: gadget: core: vaciar la cola de trabajo de gadget después de la eliminación del dispositivo device_del() puede provocar que se programe un nuevo trabajo en la cola de trabajo gadget->work. Esto se observa, por ejemplo, con el controlador dwc3 con la siguiente pila de llamadas: device_del() gadget_unbind_driver() usb_gadget_disconnect_locked() dwc3_gadget_pullup() dwc3_gadget_soft_disconnect() usb_gadget_set_state() schedule_work(&gadget->work) Mueva flush_work() después de device_del() para garantizar que se limpie la cola de trabajo.

07 Mar 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-07 09:15

Updated : 2025-10-29 20:51


NVD link : CVE-2025-21838

Mitre link : CVE-2025-21838

CVE.ORG link : CVE-2025-21838


JSON object : View

Products Affected

linux

  • linux_kernel