CVE-2023-53622 PUBLISHED

gfs2: Fix possible data races in gfs2_show_options()

Assigner: Linux
Reserved: 07.10.2025 Published: 07.10.2025 Updated: 07.10.2025

In the Linux kernel, the following vulnerability has been resolved:

gfs2: Fix possible data races in gfs2_show_options()

Some fields such as gt_logd_secs of the struct gfs2_tune are accessed without holding the lock gt_spin in gfs2_show_options():

val = sdp->sd_tune.gt_logd_secs; if (val != 30) seq_printf(s, ",commit=%d", val);

And thus can cause data races when gfs2_show_options() and other functions such as gfs2_reconfigure() are concurrently executed:

spin_lock(&gt->gt_spin); gt->gt_logd_secs = newargs->ar_commit;

To fix these possible data races, the lock sdp->sd_tune.gt_spin is acquired before accessing the fields of gfs2_tune and released after these accesses.

Further changes by Andreas:

  • Don't hold the spin lock over the seq_printf operations.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 7e5bbeb7eb813bb2568e1d5d02587df943272e57 (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 235a5ae73cea29109a3e06f100493f17857e6a93 (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to b4a7ab57effbed42624842f2ab2a49b177c21a47 (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 7c5b2649f6a37d45bfb7abf34c9b71d08677139f (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 85e888150075cb221270b64bf772341fc6bd11d9 (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to a4f71523ed2123d63b431cc0cea4e9f363a0f054 (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 42077d4de49e4d9c773c97c42d5383b4899a8f9d (excl.)
  • affected from 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 to 6fa0a72cbbe45db4ed967a51f9e6f4e3afe61d20 (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • unaffected from 4.14.324 to 4.14.* (incl.)
  • unaffected from 4.19.293 to 4.19.* (incl.)
  • unaffected from 5.4.255 to 5.4.* (incl.)
  • unaffected from 5.10.192 to 5.10.* (incl.)
  • unaffected from 5.15.128 to 5.15.* (incl.)
  • unaffected from 6.1.47 to 6.1.* (incl.)
  • unaffected from 6.4.12 to 6.4.* (incl.)
  • unaffected from 6.5 to * (incl.)

References