Skip to main content

CVE-2022-49047: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-49047cvecve-2022-49047
Published: Wed Feb 26 2025 (02/26/2025, 01:54:23 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ep93xx: clock: Fix UAF in ep93xx_clk_register_gate() arch/arm/mach-ep93xx/clock.c:154:2: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc] arch/arm/mach-ep93xx/clock.c:151:2: note: Taking true branch if (IS_ERR(clk)) ^ arch/arm/mach-ep93xx/clock.c:152:3: note: Memory is released kfree(psc); ^~~~~~~~~~ arch/arm/mach-ep93xx/clock.c:154:2: note: Use of memory after it is freed return &psc->hw; ^ ~~~~~~~~

AI-Powered Analysis

AILast updated: 07/03/2025, 03:26:23 UTC

Technical Analysis

CVE-2022-49047 is a high-severity use-after-free (UAF) vulnerability identified in the Linux kernel, specifically affecting the ep93xx architecture's clock driver implementation. The vulnerability arises in the function ep93xx_clk_register_gate() located in arch/arm/mach-ep93xx/clock.c. The root cause is improper handling of memory after it has been freed. The code path shows that when a clock pointer (clk) is checked and found to be an error (IS_ERR(clk)), the associated memory pointed to by psc is freed via kfree(psc). However, immediately after freeing, the function returns a reference to psc->hw, which is a use of memory after it has been released. This leads to undefined behavior, including potential memory corruption, crashes, or arbitrary code execution. The vulnerability is classified under CWE-416 (Use After Free). The CVSS v3.1 base score is 7.8, indicating a high severity level. The vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H indicates that the attack requires local access (AV:L), low attack complexity (AC:L), low privileges (PR:L), no user interaction (UI:N), and impacts confidentiality, integrity, and availability to a high degree. No known exploits are currently reported in the wild. The vulnerability affects specific Linux kernel versions identified by commit hashes, and it is resolved in newer kernel revisions. The ep93xx platform is an ARM-based embedded architecture used in certain specialized devices, which means the vulnerability is not widespread across all Linux systems but is critical for affected embedded systems running this kernel variant.

Potential Impact

For European organizations, the impact of CVE-2022-49047 depends largely on the deployment of devices using the ep93xx ARM architecture running vulnerable Linux kernel versions. This architecture is typically found in embedded systems, industrial control systems, or specialized hardware rather than general-purpose servers or desktops. Organizations in sectors such as manufacturing, telecommunications, or critical infrastructure that utilize embedded Linux devices based on ep93xx could face significant risks. Exploitation could lead to complete compromise of the affected device, allowing attackers to execute arbitrary code, disrupt operations, or exfiltrate sensitive data. Given the high impact on confidentiality, integrity, and availability, critical systems relying on these devices could experience operational downtime or data breaches. However, since the attack vector requires local access with low privileges, the threat is more relevant to insider threats or attackers who have already gained some foothold within the network. The absence of known exploits in the wild reduces immediate risk but does not eliminate the need for prompt remediation. European organizations with embedded Linux deployments should prioritize assessment and patching to prevent potential exploitation.

Mitigation Recommendations

1. Identify and inventory all devices running the ep93xx ARM architecture with Linux kernels potentially affected by CVE-2022-49047. 2. Apply the latest Linux kernel patches or updates that resolve this vulnerability as soon as they become available from trusted sources or maintainers. 3. For devices where kernel updates are not feasible, consider isolating them on segmented networks with strict access controls to limit local access by unauthorized users. 4. Implement strict privilege management and monitoring to detect any anomalous local activities that could indicate exploitation attempts. 5. Employ runtime protection mechanisms such as kernel hardening features (e.g., KASLR, SMEP, SMAP) and memory protection tools to mitigate exploitation impact. 6. Regularly audit embedded device firmware and software for vulnerabilities and maintain an up-to-date patch management process tailored to embedded systems. 7. Collaborate with device vendors to ensure timely security updates and support for affected hardware platforms. 8. Educate operational technology (OT) and IT teams about the risks of local privilege vulnerabilities and the importance of securing embedded devices within the network.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T01:49:39.242Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d982fc4522896dcbe69c7

Added to database: 5/21/2025, 9:09:03 AM

Last enriched: 7/3/2025, 3:26:23 AM

Last updated: 8/17/2025, 7:16:00 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats