CVE-2023-53797

Source
https://cve.org/CVERecord?id=CVE-2023-53797
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53797.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-53797
Downstream
Related
Published
2025-12-09T00:00:53.868Z
Modified
2026-03-28T17:43:35.538494Z
Summary
HID: wacom: Use ktime_t rather than int when dealing with timestamps
Details

In the Linux kernel, the following vulnerability has been resolved:

HID: wacom: Use ktime_t rather than int when dealing with timestamps

Code which interacts with timestamps needs to use the ktimet type returned by functions like ktimeget. The int type does not offer enough space to store these values, and attempting to use it is a recipe for problems. In this particular case, overflows would occur when calculating/storing timestamps leading to incorrect values being reported to userspace. In some cases these bad timestamps cause input handling in userspace to appear hung.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53797.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f9e27d4bdb1fe257c1453d02560e3adc3e5b6023
Fixed
99036f1aed7e82773904f5d91a9897bb3e507fd9
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4502ebbdc0e21e44a8a706428e420ae9c1bb9bba
Fixed
9598a647ecc8f300b0540abf9d3b3439859d163b
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5047a228d4c8e2b5d1b856f21a00ecf717945a9c
Fixed
67ce7724637c6adb66f788677cb50b82615de0ac
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
fb98336e23c11e9c8c7dd5425ec71adbbef7f773
Fixed
d89750b19681581796dfbe3689bbb5d439b99b24
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
694d3e4387bfa69925e075053894385351106e64
Fixed
bdeaa883b765709f231f47f9d6cc76c837a15396
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
17d793f3ed53080dab6bbeabfc82de890c901001
Fixed
d0198363f9108e4adb2511e607ba91e44779e8b1
Fixed
9a6c0e28e215535b2938c61ded54603b4e5814c5
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
82a136c35506dc788a6c03ffeb11b10c907b0e26

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53797.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.251
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.188
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.120
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.37
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.3.11
Type
ECOSYSTEM
Events
Introduced
6.4.0
Fixed
6.4.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53797.json"