A vulnerability was found in Linux Kernel up to 5.15.46/5.17.14/5.18.3. It has been declared as critical. This vulnerability affects the function rtw_surveydone_event_callback of the component rtl8723bs. The manipulation leads to deadlock.
This vulnerability was named CVE-2022-49309. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.15.46/5.17.14/5.18.3. It has been rated as critical. This issue affects the function cleanup_dev of the component xillybus. The manipulation leads to improper update of reference count.
The identification of this vulnerability is CVE-2022-49310. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 5.15.46/5.17.14/5.18.3. Affected is the function rtw_joinbss_event_prehandle of the component rtl8192bs. The manipulation leads to deadlock.
This vulnerability is traded as CVE-2022-49311. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 5.10.121/5.15.46/5.17.14/5.18.3. Affected by this issue is the function r871xu_drv_init of the component rtl8712. The manipulation leads to memory leak.
This vulnerability is handled as CVE-2022-49312. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.15.45/5.17.13/5.18.2. It has been declared as critical. Affected by this vulnerability is the function of_find_compatible_node. The manipulation leads to improper update of reference count.
This vulnerability is known as CVE-2022-49437. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.18.2. It has been rated as critical. Affected by this issue is the function of_find_node_by_path. The manipulation leads to improper update of reference count.
This vulnerability is handled as CVE-2022-49438. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 5.17.1. This vulnerability affects the function visconti_clk_register_gates. The manipulation leads to out-of-bounds read.
This vulnerability was named CVE-2022-49186. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 5.15.32/5.16.18/5.17.1. Affected by this issue is the function tcf_ct_skb_nfct_cached. The manipulation leads to information disclosure.
This vulnerability is handled as CVE-2022-49183. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 5.15.32/5.16.18/5.17.1. This affects the function devm_kzalloc. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2022-49184. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 5.17.1 and classified as critical. This vulnerability affects the function of_node_put. The manipulation leads to improper update of reference count.
This vulnerability was named CVE-2022-49185. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 5.10.109/5.15.32/5.16.18/5.17.1 and classified as critical. Affected by this vulnerability is the function of_parse_phandle. The manipulation leads to improper update of reference count.
This vulnerability is known as CVE-2022-49241. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.17.1. It has been classified as critical. This affects the function of_parse_phandle. The manipulation leads to improper update of reference count.
This vulnerability is uniquely identified as CVE-2022-49240. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.