{"id":"CVE-2023-53454","summary":"HID: multitouch: Correct devm device reference for hidinput input_dev name","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nHID: multitouch: Correct devm device reference for hidinput input_dev name\n\nReference the HID device rather than the input device for the devm\nallocation of the input_dev name. Referencing the input_dev would lead to a\nuse-after-free when the input_dev was unregistered and subsequently fires a\nuevent that depends on the name. At the point of firing the uevent, the\nname would be freed by devres management.\n\nUse devm_kasprintf to simplify the logic for allocating memory and\nformatting the input_dev name string.","modified":"2026-04-02T09:44:14.678003Z","published":"2025-10-01T11:42:25.760Z","related":["SUSE-SU-2025:03600-1","SUSE-SU-2025:03615-1","SUSE-SU-2025:03628-1","SUSE-SU-2025:03634-1","SUSE-SU-2025:20851-1","SUSE-SU-2025:20861-1","SUSE-SU-2025:20870-1","SUSE-SU-2025:20898-1","SUSE-SU-2025:3716-1","SUSE-SU-2025:3751-1","SUSE-SU-2025:3761-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4141-1","SUSE-SU-2026:0316-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53454.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/15ec7cb55e7d88755aa01d44a7a1015a42bfce86"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1d7833db9fd118415dace2ca157bfa603dec9c8c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2763732ec1e68910719c75b6b896e11b6d3d622b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/39c70c19456e50dcb3abfe53539220dff0490f1d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4794394635293a3e74591351fff469cea7ad15a2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ac0d389402a6ff9ad92cea02c2d8c711483b91ab"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b70ac7849248ec8128fa12f86e3655ba38838f29"},{"type":"WEB","url":"https://git.kernel.org/stable/c/dde88ab4e45beb60b217026207aa9c14c88d71ab"},{"type":"WEB","url":"https://git.kernel.org/stable/c/df7ca43fe090e1a56c216c8ebc106ef5fd49afc6"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53454.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53454"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"c08d46aa805ba46d501f610c2448d07bea979780"},{"fixed":"ac0d389402a6ff9ad92cea02c2d8c711483b91ab"},{"fixed":"39c70c19456e50dcb3abfe53539220dff0490f1d"},{"fixed":"df7ca43fe090e1a56c216c8ebc106ef5fd49afc6"},{"fixed":"15ec7cb55e7d88755aa01d44a7a1015a42bfce86"},{"fixed":"dde88ab4e45beb60b217026207aa9c14c88d71ab"},{"fixed":"2763732ec1e68910719c75b6b896e11b6d3d622b"},{"fixed":"1d7833db9fd118415dace2ca157bfa603dec9c8c"},{"fixed":"b70ac7849248ec8128fa12f86e3655ba38838f29"},{"fixed":"4794394635293a3e74591351fff469cea7ad15a2"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53454.json"}}],"schema_version":"1.7.5"}