A vulnerability was found in Linux Kernel up to 5.15.46/5.17.14/5.18.3. It has been declared as critical. This vulnerability affects the function rtw_surveydone_event_callback of the component rtl8723bs. The manipulation leads to deadlock.
This vulnerability was named CVE-2022-49309. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.15.46/5.17.14/5.18.3. It has been rated as critical. This issue affects the function cleanup_dev of the component xillybus. The manipulation leads to improper update of reference count.
The identification of this vulnerability is CVE-2022-49310. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 5.15.46/5.17.14/5.18.3. Affected is the function rtw_joinbss_event_prehandle of the component rtl8192bs. The manipulation leads to deadlock.
This vulnerability is traded as CVE-2022-49311. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 5.10.121/5.15.46/5.17.14/5.18.3. Affected by this issue is the function r871xu_drv_init of the component rtl8712. The manipulation leads to memory leak.
This vulnerability is handled as CVE-2022-49312. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.18.2. It has been rated as critical. Affected by this issue is the function of_find_node_by_path. The manipulation leads to improper update of reference count.
This vulnerability is handled as CVE-2022-49438. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.