lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025120948-CVE-2022-50677-d2c8@gregkh>
Date: Tue,  9 Dec 2025 10:31:02 +0900
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2022-50677: ipmi: fix use after free in _ipmi_destroy_user()

From: Greg Kroah-Hartman <gregkh@...nel.org>

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

ipmi: fix use after free in _ipmi_destroy_user()

The intf_free() function frees the "intf" pointer so we cannot
dereference it again on the next line.

The Linux kernel CVE team has assigned CVE-2022-50677 to this issue.


Affected and fixed versions
===========================

	Issue introduced in 4.19.92 with commit f9d405a4bd6090ffbf3bba5e2da6b44c0e013cb3 and fixed in 4.19.270 with commit 35ad87bfe330f7ef6a19f772223c63296d643172
	Issue introduced in 5.4.7 with commit b642ced2cad496c32ae1f62b85fc395391190820 and fixed in 5.4.229 with commit d23006f2a56e11a3103de0ca8b843bf7fd7d76fc
	Issue introduced in 5.5 with commit cbb79863fc3175ed5ac506465948b02a893a8235 and fixed in 5.10.163 with commit f29d127b372e1b7662397d92341d9f7de198ff99
	Issue introduced in 5.5 with commit cbb79863fc3175ed5ac506465948b02a893a8235 and fixed in 5.15.87 with commit bfce073089cb81482521c65061835aaa6d1a6cc0
	Issue introduced in 5.5 with commit cbb79863fc3175ed5ac506465948b02a893a8235 and fixed in 6.0.18 with commit f7fde441198a9ecb130c3ccec91ee2131d6998ee
	Issue introduced in 5.5 with commit cbb79863fc3175ed5ac506465948b02a893a8235 and fixed in 6.1.4 with commit 1fc9b20a7688000fcf4d7fbaa58e415a3cdda961
	Issue introduced in 5.5 with commit cbb79863fc3175ed5ac506465948b02a893a8235 and fixed in 6.2 with commit a92ce570c81dc0feaeb12a429b4bc65686d17967

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2022-50677
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	drivers/char/ipmi/ipmi_msghandler.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/35ad87bfe330f7ef6a19f772223c63296d643172
	https://git.kernel.org/stable/c/d23006f2a56e11a3103de0ca8b843bf7fd7d76fc
	https://git.kernel.org/stable/c/f29d127b372e1b7662397d92341d9f7de198ff99
	https://git.kernel.org/stable/c/bfce073089cb81482521c65061835aaa6d1a6cc0
	https://git.kernel.org/stable/c/f7fde441198a9ecb130c3ccec91ee2131d6998ee
	https://git.kernel.org/stable/c/1fc9b20a7688000fcf4d7fbaa58e415a3cdda961
	https://git.kernel.org/stable/c/a92ce570c81dc0feaeb12a429b4bc65686d17967

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ