CVE-2023-54128
Description
In the Linux kernel, the following vulnerability has been resolved:
fs: drop peer group ids under namespace lock
When cleaning up peer group ids in the failure path we need to make sure to hold on to the namespace lock. Otherwise another thread might just turn the mount from a shared into a non-shared mount concurrently.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2023-54128 is a Linux kernel race condition where peer group IDs are cleaned up without the namespace lock, allowing a concurrent thread to alter mount sharing.
In the Linux kernel, a race condition exists in the mount peer group ID cleanup path. The vulnerability occurs when cleaning up peer group IDs in a failure scenario, where the code fails to hold the namespace lock [1]. Without this lock, another thread can concurrently change a mount from a shared to a non-shared type, leading to inconsistent state [1].
The attack requires local access to the system and the ability to trigger the specific failure path in mount operations. An unprivileged user could potentially exploit this by racing mount system calls to manipulate the peer group IDs while the cleanup is in progress [1]. The namespace lock is meant to serialize such changes, so its absence creates a window of vulnerability.
An attacker successfully exploiting this race could corrupt mount sharing data structures, potentially leading to a denial of service (system crash or hang) or, in some cases, information disclosure if shared mount contents are improperly exposed [1]. The impact is primarily on system availability and integrity.
The fix has been applied in the upstream Linux kernel and is available from commit ddca03d97daa [1]. Users are advised to update their kernels to include this patch. No workaround is available other than applying the kernel update.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
40af8fae81d8bddca03d97daa65c324d3f35ccb2239c198adVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.