CVE-2023-54099
Race Condition in Linux Kernel Filesystem Remount Allows Premature Writes
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a race condition in the Linux kernel's filesystem remount code. When remounting a filesystem from read-only to read-write mode, the system clears the SB_RDONLY flag before it is fully ready to accept user writes. This allows userspace writes to start prematurely, which can cause issues such as improper preparation of quota files in ext4. The problem arises because the protection against racing writes that existed in the legacy mount path is missing in the newer code, allowing exploitation of this race condition.
How can this vulnerability impact me? :
This vulnerability can lead to filesystem inconsistencies or corruption because userspace writes may begin before the filesystem is fully prepared to handle them during a remount from read-only to read-write. For example, necessary filesystem preparations like quota file setup may be incomplete, potentially causing data integrity issues.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved in the Linux kernel by protecting the remount read-write operation from racing writes using the sb->s_readonly_remount flag. To mitigate this vulnerability, you should update your Linux kernel to the version that includes this fix.