SB20260325127 - Use After Free in Linux kernel char ipmi driver



SB20260325127 - Use After Free in Linux kernel char ipmi driver

Published: March 25, 2026

Security Bulletin ID SB20260325127
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Use After Free (CVE-ID: CVE-2026-23322)

The vulnerability allows a local user to execute arbitrary code or cause a denial of service.

The vulnerability exists due to use-after-free in the IPMI subsystem when handling message sending errors. A local user can trigger a sequence of sender errors to cause list corruption and use-after-free, leading to memory corruption and potential arbitrary code execution or system crash.

Exploitation requires the ability to send messages through the IPMI interface, which is typically accessible to local users with appropriate permissions.


Remediation

Install update from vendor's website.