vulnerability

Ubuntu: (Multiple Advisories) (CVE-2022-3544): Linux kernel vulnerabilities

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
Oct 17, 2022
Added
Jan 7, 2023
Modified
Jan 28, 2025

Description

A vulnerability, which was classified as problematic, was found in Linux Kernel. Affected is the function damon_sysfs_add_target of the file mm/damon/sysfs.c of the component Netfilter. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211044.

Solution(s)

ubuntu-upgrade-linux-image-5-19-0-1011-raspiubuntu-upgrade-linux-image-5-19-0-1011-raspi-nolpaeubuntu-upgrade-linux-image-5-19-0-1014-gcpubuntu-upgrade-linux-image-5-19-0-1014-ibmubuntu-upgrade-linux-image-5-19-0-1014-lowlatencyubuntu-upgrade-linux-image-5-19-0-1014-lowlatency-64kubuntu-upgrade-linux-image-5-19-0-1014-oracleubuntu-upgrade-linux-image-5-19-0-1015-kvmubuntu-upgrade-linux-image-5-19-0-1016-awsubuntu-upgrade-linux-image-5-19-0-1016-azureubuntu-upgrade-linux-image-5-19-0-28-genericubuntu-upgrade-linux-image-5-19-0-28-generic-64kubuntu-upgrade-linux-image-5-19-0-28-generic-lpaeubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-22-04ubuntu-upgrade-linux-image-generic-hwe-22-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-22-04ubuntu-upgrade-linux-image-ibmubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-64kubuntu-upgrade-linux-image-lowlatency-64k-hwe-22-04ubuntu-upgrade-linux-image-lowlatency-hwe-22-04ubuntu-upgrade-linux-image-oem-22-04ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-22-04
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.