CVE-2023-53454

In the Linux kernel, the following vulnerability has been resolved: HID: multitouch: Correct devm device reference for hidinput input_dev name Reference the HID device rather than the input device for the devm allocation of the input_dev name. Referencing the input_dev would lead to a use-after-free when the input_dev was unregistered and subsequently fires a uevent that depends on the name. At the point of firing the uevent, the name would be freed by devres management. Use devm_kasprintf to simplify the logic for allocating memory and formatting the input_dev name string.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

16 Jan 2026, 21:21

Type Values Removed Values Added
CWE CWE-416
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/15ec7cb55e7d88755aa01d44a7a1015a42bfce86 - () https://git.kernel.org/stable/c/15ec7cb55e7d88755aa01d44a7a1015a42bfce86 - Patch
References () https://git.kernel.org/stable/c/1d7833db9fd118415dace2ca157bfa603dec9c8c - () https://git.kernel.org/stable/c/1d7833db9fd118415dace2ca157bfa603dec9c8c - Patch
References () https://git.kernel.org/stable/c/2763732ec1e68910719c75b6b896e11b6d3d622b - () https://git.kernel.org/stable/c/2763732ec1e68910719c75b6b896e11b6d3d622b - Patch
References () https://git.kernel.org/stable/c/39c70c19456e50dcb3abfe53539220dff0490f1d - () https://git.kernel.org/stable/c/39c70c19456e50dcb3abfe53539220dff0490f1d - Patch
References () https://git.kernel.org/stable/c/4794394635293a3e74591351fff469cea7ad15a2 - () https://git.kernel.org/stable/c/4794394635293a3e74591351fff469cea7ad15a2 - Patch
References () https://git.kernel.org/stable/c/ac0d389402a6ff9ad92cea02c2d8c711483b91ab - () https://git.kernel.org/stable/c/ac0d389402a6ff9ad92cea02c2d8c711483b91ab - Patch
References () https://git.kernel.org/stable/c/b70ac7849248ec8128fa12f86e3655ba38838f29 - () https://git.kernel.org/stable/c/b70ac7849248ec8128fa12f86e3655ba38838f29 - Patch
References () https://git.kernel.org/stable/c/dde88ab4e45beb60b217026207aa9c14c88d71ab - () https://git.kernel.org/stable/c/dde88ab4e45beb60b217026207aa9c14c88d71ab - Patch
References () https://git.kernel.org/stable/c/df7ca43fe090e1a56c216c8ebc106ef5fd49afc6 - () https://git.kernel.org/stable/c/df7ca43fe090e1a56c216c8ebc106ef5fd49afc6 - Patch
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

01 Oct 2025, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-01 12:15

Updated : 2026-01-16 21:21


NVD link : CVE-2023-53454

Mitre link : CVE-2023-53454

CVE.ORG link : CVE-2023-53454


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free