Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ep93xx: clock: Fix UAF in ep93xx_clk_register_gate() arch/arm/mach-ep93xx/clock.c:154:2: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc] arch/arm/mach-ep93xx/clock.c:151:2: note: Taking true branch if (IS_ERR(clk)) ^ arch/arm/mach-ep93xx/clock.c:152:3: note: Memory is released kfree(psc); ^~~~~~~~~~ arch/arm/mach-ep93xx/clock.c:154:2: note: Use of memory after it is freed return &psc->hw; ^ ~~~~~~~~
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.16, < 5.17.4 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/0f12166872da46c6b57ba2f1314bbf310b3bf017Patch
- https://git.kernel.org/stable/c/3b68b08885217abd9c57ff9b3bb3eb173eee02a9Patch
FAQ
What is CVE-2022-49047?
CVE-2022-49047 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: ep93xx: clock: Fix UAF in ep93xx_clk_register_gate() arch/arm/mach-ep93xx/clock.c:154:2: warning: Use of memory after it is freed ...
How severe is CVE-2022-49047?
CVE-2022-49047 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-49047?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.