CVE-2022-50677
Description
In the Linux kernel, the following vulnerability has been resolved:
ipmi: fix use after free in _ipmi_destroy_user()
The intf_free() function frees the "intf" pointer so we cannot dereference it again on the next line.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel, a use-after-free bug in ipmi's _ipmi_destroy_user() occurs when intf_free() frees the 'intf' pointer, which is then dereferenced.
Vulnerability
In the Linux kernel's IPMI subsystem, the function _ipmi_destroy_user() contains a use-after-free vulnerability. The function calls intf_free() which frees the intfintf` pointer, but then attempts to dereference that same pointer on the next line, leading to a use-after-free condition [1][2].
Exploitation
An attacker with local access and the ability to trigger the IPMI user destruction path could exploit this bug. The vulnerability is triggered during normal IPMI user cleanup, and no special privileges beyond the ability to interact with the IPMI interface are required. The use-after-free occurs when the freed memory is accessed, potentially allowing an attacker to corrupt kernel memory or execute arbitrary code.
Impact
Successful exploitation could lead to a denial of service (system crash or, in more severe cases, privilege escalation. The use-after-free can corrupt kernel memory, potentially allowing an attacker to gain elevated privileges or cause a system panic.
Mitigation
This vulnerability has been patched in the Linux kernel stable releases. Users should update to a kernel version containing the fix, which ensures that the intf pointer is not dereferenced after being freed [1][2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
735ad87bfe330d23006f2a56ef29d127b372ebfce073089cbf7fde441198a1fc9b20a7688a92ce570c81dVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
7- git.kernel.org/stable/c/1fc9b20a7688000fcf4d7fbaa58e415a3cdda961nvd
- git.kernel.org/stable/c/35ad87bfe330f7ef6a19f772223c63296d643172nvd
- git.kernel.org/stable/c/a92ce570c81dc0feaeb12a429b4bc65686d17967nvd
- git.kernel.org/stable/c/bfce073089cb81482521c65061835aaa6d1a6cc0nvd
- git.kernel.org/stable/c/d23006f2a56e11a3103de0ca8b843bf7fd7d76fcnvd
- git.kernel.org/stable/c/f29d127b372e1b7662397d92341d9f7de198ff99nvd
- git.kernel.org/stable/c/f7fde441198a9ecb130c3ccec91ee2131d6998eenvd
News mentions
0No linked articles in our index yet.