CVE-2023-53865Linux vulnerability

8 documents7 sources
Severity
N/A
No vector
EPSS
0.0%
top 85.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9
Latest updateJan 27

Description

In the Linux kernel, the following vulnerability has been resolved: btrfs: fix warning when putting transaction with qgroups enabled after abort If we have a transaction abort with qgroups enabled we get a warning triggered when doing the final put on the transaction, like this: [552.6789] ------------[ cut here ]------------ [552.6815] WARNING: CPU: 4 PID: 81745 at fs/btrfs/transaction.c:144 btrfs_put_transaction+0x123/0x130 [btrfs] [552.6817] Modules linked in: btrfs blake2b_generic xor (..

Affected Packages5 packages

Linuxlinux/linux_kernel5.5.05.10.188+4
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linux40ea30638d20c92b44107247415842b72c460459ae91ab710d8e309f6c9eba07ce0d9d0b5d9040f0+7
debiandebian/linux< linux 6.1.52-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2023-53865: In the Linux kernel, the following vulnerability has been resolved: btrfs: fix warning when putting transaction with qgroups enabled after abort If we2025-12-09
GHSA
GHSA-2jgh-c6p5-562x: In the Linux kernel, the following vulnerability has been resolved: btrfs: fix warning when putting transaction with qgroups enabled after abort If2025-12-09
OSV
btrfs: fix warning when putting transaction with qgroups enabled after abort2025-12-09

📋Vendor Advisories

3
Chrome
Stable Channel Update for ChromeOS / ChromeOS Flex: CVE-2023-538652026-01-27
Red Hat
kernel: btrfs: fix warning when putting transaction with qgroups enabled after abort2025-12-09
Debian
CVE-2023-53865: linux - In the Linux kernel, the following vulnerability has been resolved: btrfs: fix ...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-53865 Impact, Exploitability, and Mitigation Steps | Wiz