-

CVE-2023-53797

In the Linux kernel, the following vulnerability has been resolved:

HID: wacom: Use ktime_t rather than int when dealing with timestamps

Code which interacts with timestamps needs to use the ktime_t type
returned by functions like ktime_get. The int type does not offer
enough space to store these values, and attempting to use it is a
recipe for problems. In this particular case, overflows would occur
when calculating/storing timestamps leading to incorrect values being
reported to userspace. In some cases these bad timestamps cause input
handling in userspace to appear hung.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 99036f1aed7e82773904f5d91a9897bb3e507fd9
Version f9e27d4bdb1fe257c1453d02560e3adc3e5b6023
Status affected
Version < 9598a647ecc8f300b0540abf9d3b3439859d163b
Version 4502ebbdc0e21e44a8a706428e420ae9c1bb9bba
Status affected
Version < 67ce7724637c6adb66f788677cb50b82615de0ac
Version 5047a228d4c8e2b5d1b856f21a00ecf717945a9c
Status affected
Version < d89750b19681581796dfbe3689bbb5d439b99b24
Version fb98336e23c11e9c8c7dd5425ec71adbbef7f773
Status affected
Version < bdeaa883b765709f231f47f9d6cc76c837a15396
Version 694d3e4387bfa69925e075053894385351106e64
Status affected
Version < d0198363f9108e4adb2511e607ba91e44779e8b1
Version 17d793f3ed53080dab6bbeabfc82de890c901001
Status affected
Version < 9a6c0e28e215535b2938c61ded54603b4e5814c5
Version 17d793f3ed53080dab6bbeabfc82de890c901001
Status affected
Version 82a136c35506dc788a6c03ffeb11b10c907b0e26
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 6.4
Status affected
Version < 6.4
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.251
Status unaffected
Version <= 5.10.*
Version 5.10.188
Status unaffected
Version <= 5.15.*
Version 5.15.120
Status unaffected
Version <= 6.1.*
Version 6.1.37
Status unaffected
Version <= 6.3.*
Version 6.3.11
Status unaffected
Version <= 6.4.*
Version 6.4.1
Status unaffected
Version <= *
Version 6.5
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.058
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String