A vulnerability classified as critical has been found in Linux Kernel up to 6.16-rc5 (Operating System).CWE is classifying the issue as CWE-674. The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.This is going to have an impact on availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or6.16-rc6 eliminates this vulnerability. Applying the patchf493f31a63847624fd3199ac836a8bd8828e50e2/125166347d5676466d368aadc0bbc31ee7714352/5641019dfbaee5e85fe093b590f0451c9dd4d6f8/1579a2777cb914a249de22c789ba4d41b154509f/3f61b997fe014bbfcc208a9fcbd363a1fe7e3a31/df0312d8859763aa15b8b56ac151a1ea4a4e5b88/c489f3283dbfc0f3c00c312149cae90d27552c45 is able to eliminate this problem. The bugfix is ready for downloadat git.kernel.org. The best possible mitigation is suggested to be upgradingto the latest version.
A vulnerability classified as critical has been found in Linux Kernel up to 6.16-rc5 (Operating System).CWE is classifying the issue as CWE-674. The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.This is going to have an impact on availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or6.16-rc6 eliminates this vulnerability. Applying the patchf493f31a63847624fd3199ac836a8bd8828e50e2/125166347d5676466d368aadc0bbc31ee7714352/5641019dfbaee5e85fe093b590f0451c9dd4d6f8/1579a2777cb914a249de22c789ba4d41b154509f/3f61b997fe014bbfcc208a9fcbd363a1fe7e3a31/df0312d8859763aa15b8b56ac151a1ea4a4e5b88/c489f3283dbfc0f3c00c312149cae90d27552c45 is able to eliminate this problem. The bugfix is ready for downloadat git.kernel.org. The best possible mitigation is suggested to be upgradingto the latest version.
A vulnerability classified as critical has been found in Linux Kernel up to 6.16-rc5 (Operating System).CWE is classifying the issue as CWE-674. The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.This is going to have an impact on availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or6.16-rc6 eliminates this vulnerability. Applying the patchf493f31a63847624fd3199ac836a8bd8828e50e2/125166347d5676466d368aadc0bbc31ee7714352/5641019dfbaee5e85fe093b590f0451c9dd4d6f8/1579a2777cb914a249de22c789ba4d41b154509f/3f61b997fe014bbfcc208a9fcbd363a1fe7e3a31/df0312d8859763aa15b8b56ac151a1ea4a4e5b88/c489f3283dbfc0f3c00c312149cae90d27552c45 is able to eliminate this problem. The bugfix is ready for downloadat git.kernel.org. The best possible mitigation is suggested to be upgradingto the latest version.
A vulnerability classified as critical has been found in Linux Kernel up to 6.16-rc5 (Operating System).CWE is classifying the issue as CWE-674. The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.This is going to have an impact on availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or6.16-rc6 eliminates this vulnerability. Applying the patchf493f31a63847624fd3199ac836a8bd8828e50e2/125166347d5676466d368aadc0bbc31ee7714352/5641019dfbaee5e85fe093b590f0451c9dd4d6f8/1579a2777cb914a249de22c789ba4d41b154509f/3f61b997fe014bbfcc208a9fcbd363a1fe7e3a31/df0312d8859763aa15b8b56ac151a1ea4a4e5b88/c489f3283dbfc0f3c00c312149cae90d27552c45 is able to eliminate this problem. The bugfix is ready for downloadat git.kernel.org. The best possible mitigation is suggested to be upgradingto the latest version.
A vulnerability classified as critical has been found in Linux Kernel up to 6.16-rc5 (Operating System).CWE is classifying the issue as CWE-674. The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.This is going to have an impact on availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or6.16-rc6 eliminates this vulnerability. Applying the patchf493f31a63847624fd3199ac836a8bd8828e50e2/125166347d5676466d368aadc0bbc31ee7714352/5641019dfbaee5e85fe093b590f0451c9dd4d6f8/1579a2777cb914a249de22c789ba4d41b154509f/3f61b997fe014bbfcc208a9fcbd363a1fe7e3a31/df0312d8859763aa15b8b56ac151a1ea4a4e5b88/c489f3283dbfc0f3c00c312149cae90d27552c45 is able to eliminate this problem. The bugfix is ready for downloadat git.kernel.org. The best possible mitigation is suggested to be upgradingto the latest version.
A vulnerability classified as critical has been found in Linux Kernel up to 6.16-rc5 (Operating System).CWE is classifying the issue as CWE-674. The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.This is going to have an impact on availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or6.16-rc6 eliminates this vulnerability. Applying the patchf493f31a63847624fd3199ac836a8bd8828e50e2/125166347d5676466d368aadc0bbc31ee7714352/5641019dfbaee5e85fe093b590f0451c9dd4d6f8/1579a2777cb914a249de22c789ba4d41b154509f/3f61b997fe014bbfcc208a9fcbd363a1fe7e3a31/df0312d8859763aa15b8b56ac151a1ea4a4e5b88/c489f3283dbfc0f3c00c312149cae90d27552c45 is able to eliminate this problem. The bugfix is ready for downloadat git.kernel.org. The best possible mitigation is suggested to be upgradingto the latest version.
A vulnerability classified as critical has been found in Linux Kernel up to 6.16-rc5 (Operating System).CWE is classifying the issue as CWE-674. The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.This is going to have an impact on availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or6.16-rc6 eliminates this vulnerability. Applying the patchf493f31a63847624fd3199ac836a8bd8828e50e2/125166347d5676466d368aadc0bbc31ee7714352/5641019dfbaee5e85fe093b590f0451c9dd4d6f8/1579a2777cb914a249de22c789ba4d41b154509f/3f61b997fe014bbfcc208a9fcbd363a1fe7e3a31/df0312d8859763aa15b8b56ac151a1ea4a4e5b88/c489f3283dbfc0f3c00c312149cae90d27552c45 is able to eliminate this problem. The bugfix is ready for downloadat git.kernel.org. The best possible mitigation is suggested to be upgradingto the latest version.
A vulnerability classified as critical has been found in Linux Kernel up to 6.16-rc5 (Operating System).CWE is classifying the issue as CWE-674. The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.This is going to have an impact on availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or6.16-rc6 eliminates this vulnerability. Applying the patchf493f31a63847624fd3199ac836a8bd8828e50e2/125166347d5676466d368aadc0bbc31ee7714352/5641019dfbaee5e85fe093b590f0451c9dd4d6f8/1579a2777cb914a249de22c789ba4d41b154509f/3f61b997fe014bbfcc208a9fcbd363a1fe7e3a31/df0312d8859763aa15b8b56ac151a1ea4a4e5b88/c489f3283dbfc0f3c00c312149cae90d27552c45 is able to eliminate this problem. The bugfix is ready for downloadat git.kernel.org. The best possible mitigation is suggested to be upgradingto the latest version.
A vulnerability classified as critical has been found in Linux Kernel up to 6.16-rc5 (Operating System).CWE is classifying the issue as CWE-674. The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.This is going to have an impact on availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or6.16-rc6 eliminates this vulnerability. Applying the patchf493f31a63847624fd3199ac836a8bd8828e50e2/125166347d5676466d368aadc0bbc31ee7714352/5641019dfbaee5e85fe093b590f0451c9dd4d6f8/1579a2777cb914a249de22c789ba4d41b154509f/3f61b997fe014bbfcc208a9fcbd363a1fe7e3a31/df0312d8859763aa15b8b56ac151a1ea4a4e5b88/c489f3283dbfc0f3c00c312149cae90d27552c45 is able to eliminate this problem. The bugfix is ready for downloadat git.kernel.org. The best possible mitigation is suggested to be upgradingto the latest version.
A vulnerability classified as critical has been found in Linux Kernel up to 6.16-rc5 (Operating System).CWE is classifying the issue as CWE-674. The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.This is going to have an impact on availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or6.16-rc6 eliminates this vulnerability. Applying the patchf493f31a63847624fd3199ac836a8bd8828e50e2/125166347d5676466d368aadc0bbc31ee7714352/5641019dfbaee5e85fe093b590f0451c9dd4d6f8/1579a2777cb914a249de22c789ba4d41b154509f/3f61b997fe014bbfcc208a9fcbd363a1fe7e3a31/df0312d8859763aa15b8b56ac151a1ea4a4e5b88/c489f3283dbfc0f3c00c312149cae90d27552c45 is able to eliminate this problem. The bugfix is ready for downloadat git.kernel.org. The best possible mitigation is suggested to be upgradingto the latest version.