CVE-2023-53622
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-02-05
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-362 | The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's gfs2 filesystem involves possible data races in the function gfs2_show_options(). Specifically, certain fields of the gfs2_tune structure, like gt_logd_secs, are accessed without proper locking (gt_spin), which can lead to concurrent access issues when gfs2_show_options() and other functions like gfs2_reconfigure() run simultaneously. The fix involves acquiring the appropriate spin lock before accessing these fields to prevent data races.
How can this vulnerability impact me? :
This vulnerability can cause data races in the gfs2 filesystem, potentially leading to inconsistent or corrupted data being read or written when multiple functions access shared data concurrently without proper synchronization. This could affect system stability or data integrity on systems using the affected Linux kernel version.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch or update to a Linux kernel version where the gfs2 data race issue in gfs2_show_options() has been fixed. This involves ensuring that the kernel acquires the appropriate spin lock (sdp->sd_tune.gt_spin) before accessing gfs2_tune fields to prevent data races.