CVE-2022-3523
Linux Kernel vulnerability analysis and mitigation

Overview

A vulnerability was discovered in the Linux Kernel's memory management component, specifically in the mm/memory.c file, identified as CVE-2022-3523. The issue was discovered on October 16, 2022, and affects the Driver Handler component. The vulnerability involves a race condition when faulting a device private page, which could potentially lead to use-after-free issues (Debian Security, Ubuntu Security).

Technical details

The vulnerability occurs when the CPU attempts to access a device private page, triggering the migrate_to_ram() callback associated with the pgmap for the page. The core issue is that no reference is taken on the faulting page, which creates a race condition where concurrent migration of the device private page can free the page and possibly the underlying pgmap. This can result in the migrate_to_ram() function pointer becoming invalid and potentially crash the kernel. Additionally, drivers cannot reliably read the zone_device_data field because the page may have been freed with memunmap_pages() (Kernel Git).

Impact

The vulnerability could lead to kernel crashes due to use-after-free issues, either from accessing a struct page which no longer exists because it has been removed or accessing fields within the struct page which are no longer valid because the page has been freed. While these issues are unlikely to cause problems during normal usage, they can be triggered from userspace by unloading the kernel module or unbinding the device from the driver prior to a userspace task exiting (Kernel Git).

Mitigation and workarounds

The issue has been fixed by getting a reference on the page while holding the ptl to ensure it has not been freed. To handle the elevated reference count causing migration failures, the faulting page is passed into the migrate_vma functions so that if an elevated reference count is found, it can be checked to determine if it's expected. The fix is available in the kernel patch 16ce101db85db694a91380aa4c89b25530871d33 (Kernel Git).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-71142N/AN/A
  • Linux KernelLinux Kernel
  • kernel-zfcpdump-modules-core
NoNoJan 14, 2026
CVE-2025-71137N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-debug-devel-matched
NoYesJan 14, 2026
CVE-2025-71135N/AN/A
  • Linux KernelLinux Kernel
  • kernel-doc
NoNoJan 14, 2026
CVE-2025-71134N/AN/A
  • Linux KernelLinux Kernel
  • kernel-abi-stablelists
NoNoJan 14, 2026
CVE-2025-71133N/AN/A
  • Linux KernelLinux Kernel
  • kernel-zfcpdump-modules
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management