In the Linux kernel, the following vulnerability has been resolved:
gfs2: Fix possible data races in gfs2_show_options()
Some fields such as gt_logd_secs of the struct gfs2_tune are accessed
without holding the lock gt_spin in gfs2_show_options():
val = sdp->sd_tune.gt_logd_secs;
if (val != 30)
seq_printf(s, ",commit=%d", val);
And thus can cause data races when gfs2_show_options() and other functions
such as gfs2_reconfigure() are concurrently executed:
spin_lock(>->gt_spin);
gt->gt_logd_secs = newargs->ar_commit;
To fix these possible data races, the lock sdp->sd_tune.gt_spin is
acquired before accessing the fields of gfs2_tune and released after these
accesses.
Further changes by Andreas:
- Don't hold the spin lock over the seq_printf operations.
References
Configurations
Configuration 1 (hide)
|
History
05 Feb 2026, 14:40
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-362 | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| References | () https://git.kernel.org/stable/c/235a5ae73cea29109a3e06f100493f17857e6a93 - Patch | |
| References | () https://git.kernel.org/stable/c/42077d4de49e4d9c773c97c42d5383b4899a8f9d - Patch | |
| References | () https://git.kernel.org/stable/c/6fa0a72cbbe45db4ed967a51f9e6f4e3afe61d20 - Patch | |
| References | () https://git.kernel.org/stable/c/7c5b2649f6a37d45bfb7abf34c9b71d08677139f - Patch | |
| References | () https://git.kernel.org/stable/c/7e5bbeb7eb813bb2568e1d5d02587df943272e57 - Patch | |
| References | () https://git.kernel.org/stable/c/85e888150075cb221270b64bf772341fc6bd11d9 - Patch | |
| References | () https://git.kernel.org/stable/c/a4f71523ed2123d63b431cc0cea4e9f363a0f054 - Patch | |
| References | () https://git.kernel.org/stable/c/b4a7ab57effbed42624842f2ab2a49b177c21a47 - Patch | |
| First Time |
Linux
Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.0 |
07 Oct 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-07 16:15
Updated : 2026-02-05 14:40
NVD link : CVE-2023-53622
Mitre link : CVE-2023-53622
CVE.ORG link : CVE-2023-53622
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
