A vulnerability, which was classified as critical, has been found in Linux Kernel up to 5.19.1. Affected by this issue is the function omapdss_init_fbdev of the component ARM. The manipulation leads to improper update of reference count.
This vulnerability is handled as CVE-2022-50203. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 5.15.60/5.18.17/5.19.1. Affected by this vulnerability is the function security_read_state_kernel of the component selinux. The manipulation leads to memory leak.
This vulnerability is known as CVE-2022-50201. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 5.19.1. Affected is the function put_entry of the component selinux. The manipulation leads to out-of-bounds read.
This vulnerability is traded as CVE-2022-50200. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.4.210/5.10.136/5.15.60/5.18.17/5.19.1. It has been rated as critical. This issue affects the function omapdss_find_dss_of_node of the component ARM. The manipulation leads to improper update of reference count.
The identification of this vulnerability is CVE-2022-50199. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.19.1. It has been declared as critical. This vulnerability affects the function of_find_matching_node of the component ARM. The manipulation leads to improper update of reference count.
This vulnerability was named CVE-2022-50198. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.19.1. It has been classified as critical. This affects the function of_find_compatible_node of the component cpufreq. The manipulation leads to improper update of reference count.
This vulnerability is uniquely identified as CVE-2022-50197. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
In the May 2025 IDC Spotlight “Ensuring Success of IT’s Accelerating Big Bang: Monitoring and Managing the Network Edge,” Mark Leary, director of network observability, automation, and artificial intelligence (AI) at IDC, states that private data centers and public cloud services continue to receive much of IT’s...
A vulnerability was found in Linux Kernel up to 5.10.136/5.15.60/5.18.17/5.19.1 and classified as critical. Affected by this issue is the function of_parse_phandle of the component soc. The manipulation leads to null pointer dereference.
This vulnerability is handled as CVE-2022-50196. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 5.19.1 and classified as critical. Affected by this vulnerability is the function pxo_board of the component ARM. The manipulation leads to denial of service.
This vulnerability is known as CVE-2022-50195. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 5.4.210/5.10.136/5.15.60/5.18.17/5.19.1. Affected is the function for_each_available_child_of_node of the component soc. The manipulation leads to improper update of reference count.
This vulnerability is traded as CVE-2022-50194. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 5.18.17/5.19.1. This issue affects the function z_erofs_lzma_head of the component erofs. The manipulation leads to state issue.
The identification of this vulnerability is CVE-2022-50193. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 5.15.60/5.18.17/5.19.1. This vulnerability affects the function tegra_slink_remove of the component spi. The manipulation leads to improper update of reference count.
This vulnerability was named CVE-2022-50192. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 5.19.1. This affects the function of_get_regulation_constraints. The manipulation leads to improper update of reference count.
This vulnerability is uniquely identified as CVE-2022-50191. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.18.17/5.19.1. It has been rated as problematic. Affected by this issue is the function htc_tx_completion of the component ath11k. The manipulation leads to privilege escalation.
This vulnerability is handled as CVE-2022-50186. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.18.17/5.19.1. It has been declared as critical. Affected by this vulnerability is the function of_find_device_by_node. The manipulation leads to improper update of reference count.
This vulnerability is known as CVE-2022-50188. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.19.1. It has been classified as critical. Affected is the function ni_set_mc_special_registers. The manipulation leads to buffer overflow.
This vulnerability is traded as CVE-2022-50185. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.19.1 and classified as critical. This issue affects the function il4965_rs_fill_link_cmd of the component wifi. The manipulation leads to off-by-one.
The identification of this vulnerability is CVE-2022-50180. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 5.19.1 and classified as problematic. This vulnerability affects the function ath9k_hif_usb_rx_cb of the component ath9k. The manipulation leads to improper initialization.
This vulnerability was named CVE-2022-50179. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 5.4.210/5.10.136/5.15.60/5.18.17/5.19.1. This affects the function for_each_available_child_of_node. The manipulation leads to improper update of reference count.
This vulnerability is uniquely identified as CVE-2022-50176. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.