CVE-2026-23322 — Linux vulnerability
7 documents6 sources
Severity
—N/A
No vectorEPSS
0.0%
top 94.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 25
Description
In the Linux kernel, the following vulnerability has been resolved:
ipmi: Fix use-after-free and list corruption on sender error
The analysis from Breno:
When the SMI sender returns an error, smi_work() delivers an error
response but then jumps back to restart without cleaning up properly:
1. intf->curr_msg is not cleared, so no new message is pulled
2. newmsg still points to the message, causing sender() to be called
again with the same message
3. If sender() fails again, deliver_err_respon…
Affected Packages4 packages
▶CVEListV5linux/linux9cf93a8fa9513c6d3cc65bdd50e05c1355cef322 — c08ec55617cb9674a060a3392ea08391ab2a4f74+3
🔴Vulnerability Details
3GHSA▶
GHSA-668m-q5h4-jfjc: In the Linux kernel, the following vulnerability has been resolved:
ipmi: Fix use-after-free and list corruption on sender error
The analysis from B↗2026-03-25
OSV▶
CVE-2026-23322: In the Linux kernel, the following vulnerability has been resolved: ipmi: Fix use-after-free and list corruption on sender error The analysis from Bre↗2026-03-25