CVE-2025-21835
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
07/03/2025
Last modified:
12/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
usb: gadget: f_midi: fix MIDI Streaming descriptor lengths<br />
<br />
While the MIDI jacks are configured correctly, and the MIDIStreaming<br />
endpoint descriptors are filled with the correct information,<br />
bNumEmbMIDIJack and bLength are set incorrectly in these descriptors.<br />
<br />
This does not matter when the numbers of in and out ports are equal, but<br />
when they differ the host will receive broken descriptors with<br />
uninitialized stack memory leaking into the descriptor for whichever<br />
value is smaller.<br />
<br />
The precise meaning of "in" and "out" in the port counts is not clearly<br />
defined and can be confusing. But elsewhere the driver consistently<br />
uses this to match the USB meaning of IN and OUT viewed from the host,<br />
so that "in" ports send data to the host and "out" ports receive data<br />
from it.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.2 (including) | 5.4.291 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.235 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.179 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.129 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.79 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.4 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/3a983390d14e8498f303fc5cb23ab7d696b815db
- https://git.kernel.org/stable/c/6ae6dee9f005a2f3b739b85abb6f14a0935699e0
- https://git.kernel.org/stable/c/6b16761a928796e4b49e89a0b1ac284155172726
- https://git.kernel.org/stable/c/9f36a89dcb78cb7e37f487b04a16396ac18c0636
- https://git.kernel.org/stable/c/9f6860a9c11301b052225ca8825f8d2b1a5825bf
- https://git.kernel.org/stable/c/a2d0694e1f111379c1efdf439dadd3cfd959fe9d
- https://git.kernel.org/stable/c/d8e86700c8a8cf415e300a0921acd6a8f9b494f8
- https://git.kernel.org/stable/c/da1668997052ed1cb00322e1f3b63702615c9429
- https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
- https://cert-portal.siemens.com/productcert/html/ssa-265688.html



