0.0
NA
CVE-2023-53797
HID: wacom: Use ktime_t rather than int when dealing with timestamps
Description

In the Linux kernel, the following vulnerability has been resolved: HID: wacom: Use ktime_t rather than int when dealing with timestamps Code which interacts with timestamps needs to use the ktime_t type returned by functions like ktime_get. The int type does not offer enough space to store these values, and attempting to use it is a recipe for problems. In this particular case, overflows would occur when calculating/storing timestamps leading to incorrect values being reported to userspace. In some cases these bad timestamps cause input handling in userspace to appear hung.

INFO

Published Date :

Dec. 9, 2025, 1:16 a.m.

Last Modified :

Dec. 9, 2025, 6:37 p.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2023-53797 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel
Solution
Update the Linux kernel to use ktime_t for timestamps to prevent overflows.
  • Update the Linux kernel to the latest version.
  • Verify timestamp handling and reporting.
  • Test input handling in userspace applications.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2023-53797 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2023-53797 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2023-53797 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2023-53797 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Dec. 09, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: HID: wacom: Use ktime_t rather than int when dealing with timestamps Code which interacts with timestamps needs to use the ktime_t type returned by functions like ktime_get. The int type does not offer enough space to store these values, and attempting to use it is a recipe for problems. In this particular case, overflows would occur when calculating/storing timestamps leading to incorrect values being reported to userspace. In some cases these bad timestamps cause input handling in userspace to appear hung.
    Added Reference https://git.kernel.org/stable/c/67ce7724637c6adb66f788677cb50b82615de0ac
    Added Reference https://git.kernel.org/stable/c/9598a647ecc8f300b0540abf9d3b3439859d163b
    Added Reference https://git.kernel.org/stable/c/99036f1aed7e82773904f5d91a9897bb3e507fd9
    Added Reference https://git.kernel.org/stable/c/9a6c0e28e215535b2938c61ded54603b4e5814c5
    Added Reference https://git.kernel.org/stable/c/bdeaa883b765709f231f47f9d6cc76c837a15396
    Added Reference https://git.kernel.org/stable/c/d0198363f9108e4adb2511e607ba91e44779e8b1
    Added Reference https://git.kernel.org/stable/c/d89750b19681581796dfbe3689bbb5d439b99b24
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
No CVSS metrics available for this vulnerability.