SB2025121071 - Use-after-free in Linux kernel char ipmi driver
Published: December 10, 2025 Updated: December 12, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2022-50677)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the _ipmi_destroy_user() function in drivers/char/ipmi/ipmi_msghandler.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/1fc9b20a7688000fcf4d7fbaa58e415a3cdda961
- https://git.kernel.org/stable/c/35ad87bfe330f7ef6a19f772223c63296d643172
- https://git.kernel.org/stable/c/a92ce570c81dc0feaeb12a429b4bc65686d17967
- https://git.kernel.org/stable/c/bfce073089cb81482521c65061835aaa6d1a6cc0
- https://git.kernel.org/stable/c/d23006f2a56e11a3103de0ca8b843bf7fd7d76fc
- https://git.kernel.org/stable/c/f29d127b372e1b7662397d92341d9f7de198ff99
- https://git.kernel.org/stable/c/f7fde441198a9ecb130c3ccec91ee2131d6998ee
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.18