CVE-2022-1419
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2022-1419 is a race condition vulnerability discovered in the virtual graphics memory manager implementation of the Linux kernel. The vulnerability was discovered by Minh Yuan from Tsinghua University and disclosed on April 21, 2022. The issue affects Linux kernel versions up to (excluding) 5.6. The vulnerability exists in the vgem virtual GPU driver where the ioctl$DRMIOCTLMODEDESTROYDUMB can decrease refcount of drmvgemgemobject (created in vgemgemdumbcreate) concurrently, leading to a use-after-free condition (OSS Security, Ubuntu Security).

Technical details

The vulnerability is caused by a race condition in the vgem virtual GPU driver. Specifically, when ioctl$DRMIOCTLMODEDESTROYDUMB decreases the reference count of drmvgemgemobject concurrently with vgemgemdumbcreate accessing the object, it can lead to a use-after-free condition. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (HIGH) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

The vulnerability can allow a local user with access to the GPU device to cause a denial of service (system crash or memory corruption) or potentially execute arbitrary code leading to privilege escalation. The impact is limited to systems where users have access to the virtual GPU device (Debian Security).

Mitigation and workarounds

The vulnerability was fixed in Linux kernel version 5.6 rc2 through commit 4b848f2 (drm/vgem: Close use-after-free race in vgemgemcreate). Various Linux distributions have released patches for their respective kernel versions. For example, Ubuntu has released updates for affected versions including 16.04 LTS and 18.04 LTS (Ubuntu Security). Debian has also released security updates to address this vulnerability in their distributions (Debian Security).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40205HIGH7.8
  • Linux KernelLinux Kernel
  • linux-hwe-6.14
NoYesNov 12, 2025
CVE-2025-40211HIGH7.1
  • Linux KernelLinux Kernel
  • linux-azure-fde-6.14
NoYesNov 21, 2025
CVE-2025-40206MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-64k-debug-devel
NoYesNov 12, 2025
CVE-2025-40210MEDIUM5.1
  • Linux KernelLinux Kernel
  • kernel-tools-libs-devel
NoYesNov 21, 2025
CVE-2025-40212N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k
NoYesNov 24, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management