A vulnerability, which was classified as problematic, was found in Linux Kernel up to 5.10.140/5.15.64/5.19.6. Affected is the function smc_fback_replace_callbacks in the library lib/refcount.c. Executing manipulation of the argument sk_user_data can lead to improper update of reference count.
This vulnerability is handled as CVE-2022-49979. The attack can only be done within the local network. There is not any exploit available.
You should upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 5.19.6 and classified as critical. This impacts the function pvr_probe of the component media. The manipulation leads to memory leak.
This vulnerability is traded as CVE-2022-49982. Access to the local network is required for this attack to succeed. There is no exploit available.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 4.19.257/5.4.212/5.10.142/5.15.67/5.19.6 and classified as problematic. This issue affects the function acpi_find_last_cache_level of the component arm64. Such manipulation leads to insufficient verification of data authenticity.
This vulnerability is uniquely identified as CVE-2022-49964. The attack can only be initiated within the local network. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 5.19.7. The impacted element is the function vc_do_resize of the component vt. Performing manipulation results in out-of-bounds read.
This vulnerability is reported as CVE-2022-49948. The attacker must have access to the local network to execute the attack. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 5.19.7. Affected by this vulnerability is the function mark_chain_precision of the component bpf. Executing manipulation can lead to unchecked return value.
This vulnerability appears as CVE-2022-49961. The attacker needs to be present on the local network. There is no available exploit.
Upgrading the affected component is advised.