CVE-2023-54099
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
24/12/2025
Last modified:
24/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
fs: Protect reconfiguration of sb read-write from racing writes<br />
<br />
The reconfigure / remount code takes a lot of effort to protect<br />
filesystem&#39;s reconfiguration code from racing writes on remounting<br />
read-only. However during remounting read-only filesystem to read-write<br />
mode userspace writes can start immediately once we clear SB_RDONLY<br />
flag. This is inconvenient for example for ext4 because we need to do<br />
some writes to the filesystem (such as preparation of quota files)<br />
before we can take userspace writes so we are clearing SB_RDONLY flag<br />
before we are fully ready to accept userpace writes and syzbot has found<br />
a way to exploit this [1]. Also as far as I&#39;m reading the code<br />
the filesystem remount code was protected from racing writes in the<br />
legacy mount path by the mount&#39;s MNT_READONLY flag so this is relatively<br />
new problem. It is actually fairly easy to protect remount read-write<br />
from racing writes using sb->s_readonly_remount flag so let&#39;s just do<br />
that instead of having to workaround these races in the filesystem code.<br />
<br />
[1] https://lore.kernel.org/all/00000000000006a0df05f6667499@google.com/T/
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0336b42456e485fda1006b5b411e7372e20fbf03
- https://git.kernel.org/stable/c/0ccfe21949bc9f706a86ee7351b74375c0745757
- https://git.kernel.org/stable/c/295ef44a2abaf97d7a594b1d4c60d4be3738191f
- https://git.kernel.org/stable/c/4abda85197ba5d695e6040d580b4b409ce0d3733
- https://git.kernel.org/stable/c/7e4e87ec56aa6d008c64eab31b340a7c452b26cc
- https://git.kernel.org/stable/c/c541dce86c537714b6761a79a969c1623dfa222b



