A vulnerability has been found in Linux Kernel up to 5.18.3 and classified as problematic. Affected is the function tcp_mtu_probe. This manipulation causes information disclosure.
This vulnerability is registered as CVE-2022-49330. The attack requires access to the local network. No exploit is available.
The affected component should be upgraded.
A vulnerability classified as critical has been found in Linux Kernel up to 5.18.2. This impacts the function user_dlm_destroy_lock of the file fs/ocfs2/dlmfs/userdlm.c of the component dlmfs. The manipulation leads to use after free.
This vulnerability is referenced as CVE-2022-49337. The attack needs to be initiated within the local network. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 5.4.197/5.10.121/5.15.46/5.17.14/5.18.3 and classified as critical. This affects the function zynqmp_dma_alloc/free_chan_resources of the component zynqmp_dma. Performing manipulation results in buffer overflow.
This vulnerability is cataloged as CVE-2022-49320. The attack must originate from the local network. There is no exploit available.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 5.18.3. It has been declared as problematic. Affected by this vulnerability is the function seg6_hmac_init in the library ipv6.ko. Executing manipulation can lead to improper initialization.
This vulnerability is registered as CVE-2022-49339. The attack requires access to the local network. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability categorized as problematic has been discovered in Linux Kernel up to 5.18.3. This affects the function xfrm4_protocol_init. The manipulation results in improper initialization.
This vulnerability is reported as CVE-2022-49345. The attacker must have access to the local network to execute the attack. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 5.4.188/5.10.109/5.15.32/5.16.18/5.17.1. This affects the function snd_dma_free_pages. The manipulation results in null pointer dereference.
This vulnerability was named CVE-2022-49268. The attack needs to be approached within the local network. There is no available exploit.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.10.109/5.15.32/5.16.18/5.17.1 and classified as critical. Affected is the function smb2_ioctl_query_info. Such manipulation of the argument argv[] leads to memory corruption.
This vulnerability is referenced as CVE-2022-49271. The attack needs to be initiated within the local network. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.10.109/5.15.32/5.16.18/5.17.1. It has been rated as critical. This affects the function to_user. The manipulation leads to improper update of reference count.
This vulnerability is listed as CVE-2022-49272. The attack must be carried out from within the local network. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 5.10.109/5.15.32/5.16.18/5.17.1. Affected is the function rproc_coredump_write. This manipulation causes integer underflow.
This vulnerability is handled as CVE-2022-49278. The attack can be initiated remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.15.53/5.17.1 and classified as problematic. This affects the function to_i2c_client. Executing manipulation can lead to null pointer dereference.
The identification of this vulnerability is CVE-2022-49285. The attack needs to be done within the local network. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 5.4.188/5.10.109/5.15.32/5.16.18/5.17.1 and classified as critical. This issue affects the function brcmf_pcie_setup. The manipulation leads to memory leak.
This vulnerability is uniquely identified as CVE-2022-49263. The attack can only be initiated within the local network. No exploit exists.
The affected component should be upgraded.
A vulnerability marked as critical has been reported in Linux Kernel up to 5.15.32/5.16.18/5.17.1. Affected by this issue is some unknown functionality of the component sysfb_create_simplefb. This manipulation causes memory leak.
This vulnerability is registered as CVE-2022-49283. The attack requires access to the local network. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 5.15.32/5.16.18/5.17.1. The affected element is the function dqi_gqlock of the component ocfs2. The manipulation results in uninitialized pointer.
This vulnerability is known as CVE-2022-49274. Access to the local network is required for this attack. No exploit is available.
You should upgrade the affected component.
A vulnerability labeled as problematic has been found in Linux Kernel up to 5.18.2. Affected by this issue is the function bug_on of the file fs/ext4/inode.c of the component ext4. The manipulation results in allocation of resources.
This vulnerability is known as CVE-2022-49347. Access to the local network is required for this attack. No exploit is available.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 5.15.46/5.17.14/5.18.3. It has been declared as problematic. Impacted is an unknown function of the component TCP. The manipulation results in information disclosure.
This vulnerability is reported as CVE-2022-49325. The attacker must have access to the local network to execute the attack. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in OpenBSD OpenSSH up to 3.0.1. Affected by this issue is some unknown functionality of the component Channel Code Handler. The manipulation leads to numeric error.
This vulnerability is referenced as CVE-2002-0083. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in mod_ssl and Apache-ssl. Affected by this vulnerability is the function i2d_SSL_SESSION of the component dbm/shm Session Cache. Executing manipulation can lead to memory corruption.
The identification of this vulnerability is CVE-2002-0082. The attack may be launched remotely. Furthermore, there is an exploit available.
Upgrading the affected component is recommended.
A vulnerability classified as problematic was found in Sun Solaris 2.6/7.0/8.0. This affects the function fscache_setup of the component cachefsd. The manipulation of the argument mount results in memory corruption.
This vulnerability is identified as CVE-2002-0084. The attack can be executed remotely. Additionally, an exploit exists.
Upgrading the affected component is advised.