{"id":"CVE-2022-3623","details":"A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function follow_page_pte of the file mm/gup.c of the component BPF. The manipulation leads to race condition. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211921 was assigned to this vulnerability.","modified":"2026-03-13T05:55:36.782139Z","published":"2022-10-20T20:15:09.850Z","related":["ALSA-2023:2148","ALSA-2023:2458","ALSA-2023:2736","ALSA-2023:2951","MGASA-2022-0442","MGASA-2022-0443","SUSE-SU-2022:3897-1"],"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html"},{"type":"ADVISORY","url":"https://vuldb.com/?id.211921"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5324"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"5.1"},{"fixed":"5.4.228"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.159"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.15.78"}]},{"events":[{"introduced":"5.16"},{"fixed":"5.19.17"}]},{"events":[{"introduced":"6.0"},{"fixed":"6.0.3"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-3623.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}