linux-azure, linux-aws, linux-gcp, linux-oracle and linux-kvm is vulnerable to Use After Free. The vulnerability exists in mm/mremap.c
via a stale tlb because of a rmap lock is not held during a pud move.
git://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2022-41222
packetstormsecurity.com/files/168466/Linux-Stable-5.4-5.10-Use-After-Free-Race-Condition.html
packetstormsecurity.com/files/171005/Kernel-Live-Patch-Security-Notice-LNS-0091-1.html
bugs.chromium.org/p/project-zero/issues/detail?id=2347
cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2
lists.debian.org/debian-lts-announce/2022/11/msg00001.html
security.netapp.com/advisory/ntap-20230214-0008/