CVE-2022-49047
26.02.2025, 07:00
In the Linux kernel, the following vulnerability has been resolved: ep93xx: clock: Fix UAF in ep93xx_clk_register_gate() arch/arm/mach-ep93xx/clock.c:154:2: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc] arch/arm/mach-ep93xx/clock.c:151:2: note: Taking true branch if (IS_ERR(clk)) ^ arch/arm/mach-ep93xx/clock.c:152:3: note: Memory is released kfree(psc); ^~~~~~~~~~ arch/arm/mach-ep93xx/clock.c:154:2: note: Use of memory after it is freed return &psc->hw; ^ ~~~~~~~~Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 5.16 ≤ 𝑥 < 5.17.4 |
linux | linux_kernel | 5.18:rc1 |
linux | linux_kernel | 5.18:rc2 |
𝑥
= Vulnerable software versions

Debian Releases
Common Weakness Enumeration