CVE-2022-49047: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ep93xx: clock: Fix UAF in ep93xx_clk_register_gate() arch/arm/mach-ep93xx/clock.c:154:2: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc] arch/arm/mach-ep93xx/clock.c:151:2: note: Taking true branch if (IS_ERR(clk)) ^ arch/arm/mach-ep93xx/clock.c:152:3: note: Memory is released kfree(psc); ^~~~~~~~~~ arch/arm/mach-ep93xx/clock.c:154:2: note: Use of memory after it is freed return &psc->hw; ^ ~~~~~~~~
AI Analysis
Technical Summary
CVE-2022-49047 is a high-severity use-after-free (UAF) vulnerability identified in the Linux kernel, specifically affecting the ep93xx architecture's clock driver implementation. The vulnerability arises in the function ep93xx_clk_register_gate() located in arch/arm/mach-ep93xx/clock.c. The root cause is improper handling of memory after it has been freed. The code path shows that when a clock pointer (clk) is checked and found to be an error (IS_ERR(clk)), the associated memory pointed to by psc is freed via kfree(psc). However, immediately after freeing, the function returns a reference to psc->hw, which is a use of memory after it has been released. This leads to undefined behavior, including potential memory corruption, crashes, or arbitrary code execution. The vulnerability is classified under CWE-416 (Use After Free). The CVSS v3.1 base score is 7.8, indicating a high severity level. The vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H indicates that the attack requires local access (AV:L), low attack complexity (AC:L), low privileges (PR:L), no user interaction (UI:N), and impacts confidentiality, integrity, and availability to a high degree. No known exploits are currently reported in the wild. The vulnerability affects specific Linux kernel versions identified by commit hashes, and it is resolved in newer kernel revisions. The ep93xx platform is an ARM-based embedded architecture used in certain specialized devices, which means the vulnerability is not widespread across all Linux systems but is critical for affected embedded systems running this kernel variant.
Potential Impact
For European organizations, the impact of CVE-2022-49047 depends largely on the deployment of devices using the ep93xx ARM architecture running vulnerable Linux kernel versions. This architecture is typically found in embedded systems, industrial control systems, or specialized hardware rather than general-purpose servers or desktops. Organizations in sectors such as manufacturing, telecommunications, or critical infrastructure that utilize embedded Linux devices based on ep93xx could face significant risks. Exploitation could lead to complete compromise of the affected device, allowing attackers to execute arbitrary code, disrupt operations, or exfiltrate sensitive data. Given the high impact on confidentiality, integrity, and availability, critical systems relying on these devices could experience operational downtime or data breaches. However, since the attack vector requires local access with low privileges, the threat is more relevant to insider threats or attackers who have already gained some foothold within the network. The absence of known exploits in the wild reduces immediate risk but does not eliminate the need for prompt remediation. European organizations with embedded Linux deployments should prioritize assessment and patching to prevent potential exploitation.
Mitigation Recommendations
1. Identify and inventory all devices running the ep93xx ARM architecture with Linux kernels potentially affected by CVE-2022-49047. 2. Apply the latest Linux kernel patches or updates that resolve this vulnerability as soon as they become available from trusted sources or maintainers. 3. For devices where kernel updates are not feasible, consider isolating them on segmented networks with strict access controls to limit local access by unauthorized users. 4. Implement strict privilege management and monitoring to detect any anomalous local activities that could indicate exploitation attempts. 5. Employ runtime protection mechanisms such as kernel hardening features (e.g., KASLR, SMEP, SMAP) and memory protection tools to mitigate exploitation impact. 6. Regularly audit embedded device firmware and software for vulnerabilities and maintain an up-to-date patch management process tailored to embedded systems. 7. Collaborate with device vendors to ensure timely security updates and support for affected hardware platforms. 8. Educate operational technology (OT) and IT teams about the risks of local privilege vulnerabilities and the importance of securing embedded devices within the network.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Sweden, Finland
CVE-2022-49047: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ep93xx: clock: Fix UAF in ep93xx_clk_register_gate() arch/arm/mach-ep93xx/clock.c:154:2: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc] arch/arm/mach-ep93xx/clock.c:151:2: note: Taking true branch if (IS_ERR(clk)) ^ arch/arm/mach-ep93xx/clock.c:152:3: note: Memory is released kfree(psc); ^~~~~~~~~~ arch/arm/mach-ep93xx/clock.c:154:2: note: Use of memory after it is freed return &psc->hw; ^ ~~~~~~~~
AI-Powered Analysis
Technical Analysis
CVE-2022-49047 is a high-severity use-after-free (UAF) vulnerability identified in the Linux kernel, specifically affecting the ep93xx architecture's clock driver implementation. The vulnerability arises in the function ep93xx_clk_register_gate() located in arch/arm/mach-ep93xx/clock.c. The root cause is improper handling of memory after it has been freed. The code path shows that when a clock pointer (clk) is checked and found to be an error (IS_ERR(clk)), the associated memory pointed to by psc is freed via kfree(psc). However, immediately after freeing, the function returns a reference to psc->hw, which is a use of memory after it has been released. This leads to undefined behavior, including potential memory corruption, crashes, or arbitrary code execution. The vulnerability is classified under CWE-416 (Use After Free). The CVSS v3.1 base score is 7.8, indicating a high severity level. The vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H indicates that the attack requires local access (AV:L), low attack complexity (AC:L), low privileges (PR:L), no user interaction (UI:N), and impacts confidentiality, integrity, and availability to a high degree. No known exploits are currently reported in the wild. The vulnerability affects specific Linux kernel versions identified by commit hashes, and it is resolved in newer kernel revisions. The ep93xx platform is an ARM-based embedded architecture used in certain specialized devices, which means the vulnerability is not widespread across all Linux systems but is critical for affected embedded systems running this kernel variant.
Potential Impact
For European organizations, the impact of CVE-2022-49047 depends largely on the deployment of devices using the ep93xx ARM architecture running vulnerable Linux kernel versions. This architecture is typically found in embedded systems, industrial control systems, or specialized hardware rather than general-purpose servers or desktops. Organizations in sectors such as manufacturing, telecommunications, or critical infrastructure that utilize embedded Linux devices based on ep93xx could face significant risks. Exploitation could lead to complete compromise of the affected device, allowing attackers to execute arbitrary code, disrupt operations, or exfiltrate sensitive data. Given the high impact on confidentiality, integrity, and availability, critical systems relying on these devices could experience operational downtime or data breaches. However, since the attack vector requires local access with low privileges, the threat is more relevant to insider threats or attackers who have already gained some foothold within the network. The absence of known exploits in the wild reduces immediate risk but does not eliminate the need for prompt remediation. European organizations with embedded Linux deployments should prioritize assessment and patching to prevent potential exploitation.
Mitigation Recommendations
1. Identify and inventory all devices running the ep93xx ARM architecture with Linux kernels potentially affected by CVE-2022-49047. 2. Apply the latest Linux kernel patches or updates that resolve this vulnerability as soon as they become available from trusted sources or maintainers. 3. For devices where kernel updates are not feasible, consider isolating them on segmented networks with strict access controls to limit local access by unauthorized users. 4. Implement strict privilege management and monitoring to detect any anomalous local activities that could indicate exploitation attempts. 5. Employ runtime protection mechanisms such as kernel hardening features (e.g., KASLR, SMEP, SMAP) and memory protection tools to mitigate exploitation impact. 6. Regularly audit embedded device firmware and software for vulnerabilities and maintain an up-to-date patch management process tailored to embedded systems. 7. Collaborate with device vendors to ensure timely security updates and support for affected hardware platforms. 8. Educate operational technology (OT) and IT teams about the risks of local privilege vulnerabilities and the importance of securing embedded devices within the network.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T01:49:39.242Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d982fc4522896dcbe69c7
Added to database: 5/21/2025, 9:09:03 AM
Last enriched: 7/3/2025, 3:26:23 AM
Last updated: 11/20/2025, 2:17:31 AM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13442: Command Injection in UTT 进取 750W
MediumCVE-2025-13435: Path Traversal in Dreampie Resty
MediumCVE-2025-13434: Improper Neutralization of HTTP Headers for Scripting Syntax in jameschz Hush Framework
MediumCVE-2025-13433: Unquoted Search Path in Muse Group MuseHub
HighCVE-2025-13424: SQL Injection in Campcodes Supplier Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.