VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54128

CVE-2023-54128

Description

In the Linux kernel, the following vulnerability has been resolved:

fs: drop peer group ids under namespace lock

When cleaning up peer group ids in the failure path we need to make sure to hold on to the namespace lock. Otherwise another thread might just turn the mount from a shared into a non-shared mount concurrently.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2023-54128 is a Linux kernel race condition where peer group IDs are cleaned up without the namespace lock, allowing a concurrent thread to alter mount sharing.

In the Linux kernel, a race condition exists in the mount peer group ID cleanup path. The vulnerability occurs when cleaning up peer group IDs in a failure scenario, where the code fails to hold the namespace lock [1]. Without this lock, another thread can concurrently change a mount from a shared to a non-shared type, leading to inconsistent state [1].

The attack requires local access to the system and the ability to trigger the specific failure path in mount operations. An unprivileged user could potentially exploit this by racing mount system calls to manipulate the peer group IDs while the cleanup is in progress [1]. The namespace lock is meant to serialize such changes, so its absence creates a window of vulnerability.

An attacker successfully exploiting this race could corrupt mount sharing data structures, potentially leading to a denial of service (system crash or hang) or, in some cases, information disclosure if shared mount contents are improperly exposed [1]. The impact is primarily on system availability and integrity.

The fix has been applied in the upstream Linux kernel and is available from commit ddca03d97daa [1]. Users are advised to update their kernels to include this patch. No workaround is available other than applying the kernel update.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

4

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.