
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in the Linux Kernel's memory management component, specifically in the mm/memory.c file, identified as CVE-2022-3523. The issue was discovered on October 16, 2022, and affects the Driver Handler component. The vulnerability involves a race condition when faulting a device private page, which could potentially lead to use-after-free issues (Debian Security, Ubuntu Security).
The vulnerability occurs when the CPU attempts to access a device private page, triggering the migrate_to_ram() callback associated with the pgmap for the page. The core issue is that no reference is taken on the faulting page, which creates a race condition where concurrent migration of the device private page can free the page and possibly the underlying pgmap. This can result in the migrate_to_ram() function pointer becoming invalid and potentially crash the kernel. Additionally, drivers cannot reliably read the zone_device_data field because the page may have been freed with memunmap_pages() (Kernel Git).
The vulnerability could lead to kernel crashes due to use-after-free issues, either from accessing a struct page which no longer exists because it has been removed or accessing fields within the struct page which are no longer valid because the page has been freed. While these issues are unlikely to cause problems during normal usage, they can be triggered from userspace by unloading the kernel module or unbinding the device from the driver prior to a userspace task exiting (Kernel Git).
The issue has been fixed by getting a reference on the page while holding the ptl to ensure it has not been freed. To handle the elevated reference count causing migration failures, the faulting page is passed into the migrate_vma functions so that if an elevated reference count is found, it can be checked to determine if it's expected. The fix is available in the kernel patch 16ce101db85db694a91380aa4c89b25530871d33 (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."