CVE-2023-53797 (GCVE-0-2023-53797)
Vulnerability from cvelistv5
Published
2025-12-09 00:00
Modified
2025-12-09 00:00
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: HID: wacom: Use ktime_t rather than int when dealing with timestamps Code which interacts with timestamps needs to use the ktime_t type returned by functions like ktime_get. The int type does not offer enough space to store these values, and attempting to use it is a recipe for problems. In this particular case, overflows would occur when calculating/storing timestamps leading to incorrect values being reported to userspace. In some cases these bad timestamps cause input handling in userspace to appear hung.
Impacted products
Vendor Product Version
Linux Linux Version: f9e27d4bdb1fe257c1453d02560e3adc3e5b6023
Version: 4502ebbdc0e21e44a8a706428e420ae9c1bb9bba
Version: 5047a228d4c8e2b5d1b856f21a00ecf717945a9c
Version: fb98336e23c11e9c8c7dd5425ec71adbbef7f773
Version: 694d3e4387bfa69925e075053894385351106e64
Version: 17d793f3ed53080dab6bbeabfc82de890c901001
Version: 17d793f3ed53080dab6bbeabfc82de890c901001
Version: 82a136c35506dc788a6c03ffeb11b10c907b0e26
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/hid/wacom_wac.c",
            "drivers/hid/wacom_wac.h"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "99036f1aed7e82773904f5d91a9897bb3e507fd9",
              "status": "affected",
              "version": "f9e27d4bdb1fe257c1453d02560e3adc3e5b6023",
              "versionType": "git"
            },
            {
              "lessThan": "9598a647ecc8f300b0540abf9d3b3439859d163b",
              "status": "affected",
              "version": "4502ebbdc0e21e44a8a706428e420ae9c1bb9bba",
              "versionType": "git"
            },
            {
              "lessThan": "67ce7724637c6adb66f788677cb50b82615de0ac",
              "status": "affected",
              "version": "5047a228d4c8e2b5d1b856f21a00ecf717945a9c",
              "versionType": "git"
            },
            {
              "lessThan": "d89750b19681581796dfbe3689bbb5d439b99b24",
              "status": "affected",
              "version": "fb98336e23c11e9c8c7dd5425ec71adbbef7f773",
              "versionType": "git"
            },
            {
              "lessThan": "bdeaa883b765709f231f47f9d6cc76c837a15396",
              "status": "affected",
              "version": "694d3e4387bfa69925e075053894385351106e64",
              "versionType": "git"
            },
            {
              "lessThan": "d0198363f9108e4adb2511e607ba91e44779e8b1",
              "status": "affected",
              "version": "17d793f3ed53080dab6bbeabfc82de890c901001",
              "versionType": "git"
            },
            {
              "lessThan": "9a6c0e28e215535b2938c61ded54603b4e5814c5",
              "status": "affected",
              "version": "17d793f3ed53080dab6bbeabfc82de890c901001",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "82a136c35506dc788a6c03ffeb11b10c907b0e26",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/hid/wacom_wac.c",
            "drivers/hid/wacom_wac.h"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.4"
            },
            {
              "lessThan": "6.4",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.251",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.188",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.120",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.37",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.3.*",
              "status": "unaffected",
              "version": "6.3.11",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.4.*",
              "status": "unaffected",
              "version": "6.4.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.5",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.251",
                  "versionStartIncluding": "5.4.243",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.188",
                  "versionStartIncluding": "5.10.180",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.120",
                  "versionStartIncluding": "5.15.112",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.37",
                  "versionStartIncluding": "6.1.29",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.3.11",
                  "versionStartIncluding": "6.3.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.4.1",
                  "versionStartIncluding": "6.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.5",
                  "versionStartIncluding": "6.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "6.2.16",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: wacom: Use ktime_t rather than int when dealing with timestamps\n\nCode which interacts with timestamps needs to use the ktime_t type\nreturned by functions like ktime_get. The int type does not offer\nenough space to store these values, and attempting to use it is a\nrecipe for problems. In this particular case, overflows would occur\nwhen calculating/storing timestamps leading to incorrect values being\nreported to userspace. In some cases these bad timestamps cause input\nhandling in userspace to appear hung."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-09T00:00:53.868Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/99036f1aed7e82773904f5d91a9897bb3e507fd9"
        },
        {
          "url": "https://git.kernel.org/stable/c/9598a647ecc8f300b0540abf9d3b3439859d163b"
        },
        {
          "url": "https://git.kernel.org/stable/c/67ce7724637c6adb66f788677cb50b82615de0ac"
        },
        {
          "url": "https://git.kernel.org/stable/c/d89750b19681581796dfbe3689bbb5d439b99b24"
        },
        {
          "url": "https://git.kernel.org/stable/c/bdeaa883b765709f231f47f9d6cc76c837a15396"
        },
        {
          "url": "https://git.kernel.org/stable/c/d0198363f9108e4adb2511e607ba91e44779e8b1"
        },
        {
          "url": "https://git.kernel.org/stable/c/9a6c0e28e215535b2938c61ded54603b4e5814c5"
        }
      ],
      "title": "HID: wacom: Use ktime_t rather than int when dealing with timestamps",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2023-53797",
    "datePublished": "2025-12-09T00:00:53.868Z",
    "dateReserved": "2025-12-08T23:58:35.275Z",
    "dateUpdated": "2025-12-09T00:00:53.868Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…