In the Linux kernel, the following vulnerability has been resolved:
ep93xx: clock: Fix UAF in ep93xxclkregister_gate()
arch/arm/mach-ep93xx/clock.c:154:2: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc] arch/arm/mach-ep93xx/clock.c:151:2: note: Taking true branch if (IS_ERR(clk)) ^ arch/arm/mach-ep93xx/clock.c:152:3: note: Memory is released kfree(psc); ^~~~~~~~~~ arch/arm/mach-ep93xx/clock.c:154:2: note: Use of memory after it is freed return &psc->hw; ^ ~~~~~~~~
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49047.json",
"cna_assigner": "Linux"
}[
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "arch/arm/mach-ep93xx/clock.c",
"function": "ep93xx_clk_register_gate"
},
"id": "CVE-2022-49047-db043c1c",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0f12166872da46c6b57ba2f1314bbf310b3bf017",
"digest": {
"function_hash": "271506025367220011500996291892137337707",
"length": 625.0
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "arch/arm/mach-ep93xx/clock.c"
},
"id": "CVE-2022-49047-dfee4553",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0f12166872da46c6b57ba2f1314bbf310b3bf017",
"digest": {
"line_hashes": [
"16004323006525376600948697784538907812",
"34548351323623826100877482660969052835",
"80615578458355565797182614175609053861",
"16306278921531847629326326188943703110",
"69462182876611904457693727189697212953"
],
"threshold": 0.9
}
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49047.json"