{"id":"CVE-2025-21923","summary":"HID: hid-steam: Fix use-after-free when detaching device","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nHID: hid-steam: Fix use-after-free when detaching device\n\nWhen a hid-steam device is removed it must clean up the client_hdev used for\nintercepting hidraw access. This can lead to scheduling deferred work to\nreattach the input device. Though the cleanup cancels the deferred work, this\nwas done before the client_hdev itself is cleaned up, so it gets rescheduled.\nThis patch fixes the ordering to make sure the deferred work is properly\ncanceled.","modified":"2026-04-02T12:45:17.280852Z","published":"2025-04-01T15:40:56.229Z","related":["SUSE-SU-2025:01614-1","SUSE-SU-2025:01707-1","SUSE-SU-2025:01919-1","SUSE-SU-2025:01951-1","SUSE-SU-2025:01964-1","SUSE-SU-2025:01967-1","SUSE-SU-2025:20192-1","SUSE-SU-2025:20206-1","SUSE-SU-2025:20270-1","SUSE-SU-2025:20283-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21923.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/026714ec7546de741826324a6a1914c91024d06c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a899adf7063c6745aaff1ec869f3c7f6329ed0a1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e53fc232a65f7488ab75d03a5b95f06aaada7262"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ea3f18d2f02629653b7bfe42607737ccd1343e54"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21923.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21923"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"e1147961b2145fa61c3078a4a797d9576cde91ab"},{"fixed":"026714ec7546de741826324a6a1914c91024d06c"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"3e38cbbfa0a128a9d64773240a9eb3bc7bae3b1a"},{"fixed":"a899adf7063c6745aaff1ec869f3c7f6329ed0a1"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"053fa3888d2a957f4db26c05e503f4c6b9570a30"},{"fixed":"ea3f18d2f02629653b7bfe42607737ccd1343e54"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"79504249d7e27cad4a3eeb9afc6386e418728ce0"},{"fixed":"e53fc232a65f7488ab75d03a5b95f06aaada7262"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-21923.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}