CVE-2023-54099 — Time-of-check Time-of-use (TOCTOU) Race Condition in Linux
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24
Description
In the Linux kernel, the following vulnerability has been resolved:
fs: Protect reconfiguration of sb read-write from racing writes
The reconfigure / remount code takes a lot of effort to protect
filesystem's reconfiguration code from racing writes on remounting
read-only. However during remounting read-only filesystem to read-write
mode userspace writes can start immediately once we clear SB_RDONLY
flag. This is inconvenient for example for ext4 because we need to do
some writes to the filesy…
Affected Packages4 packages
▶CVEListV5linux/linux8d0347f6c3a9d4953ddd636a31c6584da082e084 — 0336b42456e485fda1006b5b411e7372e20fbf03+6
🔴Vulnerability Details
3GHSA▶
GHSA-vwq3-xpg9-vpx4: In the Linux kernel, the following vulnerability has been resolved:
fs: Protect reconfiguration of sb read-write from racing writes
The reconfigure↗2025-12-24
OSV▶
CVE-2023-54099: In the Linux kernel, the following vulnerability has been resolved: fs: Protect reconfiguration of sb read-write from racing writes The reconfigure /↗2025-12-24