CVE-2023-54207

7.8 HIGH

📋 TL;DR

This CVE describes a use-after-free vulnerability in the Linux kernel's HID uclogic driver. When the input device is unregistered, it can trigger a uevent that references freed memory for the device name, potentially causing kernel crashes or instability. This affects Linux systems using the uclogic HID driver, typically for graphics tablets or similar input devices.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions with the vulnerable uclogic HID driver code prior to the fix commits
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the uclogic HID driver, typically for specific graphics tablets or input devices. The vulnerability is in the kernel driver code itself.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially allowing local privilege escalation if combined with other vulnerabilities.

🟠

Likely Case

System instability or crash when unplugging or reconfiguring affected HID devices, requiring system reboot.

🟢

If Mitigated

Minor system instability that self-recovers or requires manual intervention.

🌐 Internet-Facing: LOW - This is a local kernel vulnerability requiring physical or local access to trigger via device events.
🏢 Internal Only: MEDIUM - Local users or processes could trigger this vulnerability by manipulating HID devices, potentially causing system-wide disruption.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and ability to trigger device unregistration events. No public exploits have been reported.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits: 4c2707dfee5847dc0b5ecfbe512c29c93832fdc4, 51f49e3927ad545cec0c0afb86856ccacd9f085d, 58f0d1c0e494a88f301bf455da7df4366f179bbb, dd613a4e45f8d35f49a63a2064e5308fa5619e29, f283805d984343b2f216e2f4c6c7af265b9542ae

Vendor Advisory: https://git.kernel.org/stable/c/4c2707dfee5847dc0b5ecfbe512c29c93832fdc4

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Check distribution-specific security advisories for backported patches. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Disable uclogic HID driver

linux

Blacklist or disable the uclogic HID driver module to prevent loading

echo 'blacklist hid-uclogic' >> /etc/modprobe.d/blacklist.conf
rmmod hid-uclogic

Avoid affected hardware

linux

Disconnect or avoid using graphics tablets and devices that use the uclogic HID driver

🧯 If You Can't Patch

  • Restrict physical access to systems to prevent local users from triggering device events
  • Implement strict device connection policies and monitor for unusual HID device activity

🔍 How to Verify

Check if Vulnerable:

Check if uclogic HID driver is loaded: lsmod | grep uclogic. Check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits or check distribution security advisory. Confirm uclogic driver loads without issues during device connect/disconnect cycles.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages in /var/log/kern.log or dmesg
  • UEVENT errors related to HID devices
  • System crash reports

Network Indicators:

  • None - this is a local kernel vulnerability

SIEM Query:

source="kernel" AND ("panic" OR "Oops" OR "use-after-free") AND "HID"

🔗 References

📤 Share & Export