{"id":"CVE-2022-50677","summary":"ipmi: fix use after free in _ipmi_destroy_user()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nipmi: fix use after free in _ipmi_destroy_user()\n\nThe intf_free() function frees the \"intf\" pointer so we cannot\ndereference it again on the next line.","modified":"2026-04-02T08:28:42.126526Z","published":"2025-12-09T01:29:30.418Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0316-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50677.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1fc9b20a7688000fcf4d7fbaa58e415a3cdda961"},{"type":"WEB","url":"https://git.kernel.org/stable/c/35ad87bfe330f7ef6a19f772223c63296d643172"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a92ce570c81dc0feaeb12a429b4bc65686d17967"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bfce073089cb81482521c65061835aaa6d1a6cc0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d23006f2a56e11a3103de0ca8b843bf7fd7d76fc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f29d127b372e1b7662397d92341d9f7de198ff99"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f7fde441198a9ecb130c3ccec91ee2131d6998ee"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50677.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50677"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"f9d405a4bd6090ffbf3bba5e2da6b44c0e013cb3"},{"fixed":"35ad87bfe330f7ef6a19f772223c63296d643172"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"b642ced2cad496c32ae1f62b85fc395391190820"},{"fixed":"d23006f2a56e11a3103de0ca8b843bf7fd7d76fc"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"cbb79863fc3175ed5ac506465948b02a893a8235"},{"fixed":"f29d127b372e1b7662397d92341d9f7de198ff99"},{"fixed":"bfce073089cb81482521c65061835aaa6d1a6cc0"},{"fixed":"f7fde441198a9ecb130c3ccec91ee2131d6998ee"},{"fixed":"1fc9b20a7688000fcf4d7fbaa58e415a3cdda961"},{"fixed":"a92ce570c81dc0feaeb12a429b4bc65686d17967"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50677.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.19.270"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.229"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.163"},{"fixed":"5.15.87"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"6.0.18"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.4"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50677.json"}}],"schema_version":"1.7.5"}