CVE-2022-50328

In the Linux kernel, the following vulnerability has been resolved: jbd2: fix potential use-after-free in jbd2_fc_wait_bufs In 'jbd2_fc_wait_bufs' use 'bh' after put buffer head reference count which may lead to use-after-free. So judge buffer if uptodate before put buffer head reference count.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

04 Dec 2025, 13:42

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1d4d16daec2a6689b6d3fbfc7d2078643adc6619 - () https://git.kernel.org/stable/c/1d4d16daec2a6689b6d3fbfc7d2078643adc6619 - Patch
References () https://git.kernel.org/stable/c/243d1a5d505d0b0460c9af0ad56ed4a56ef0bebd - () https://git.kernel.org/stable/c/243d1a5d505d0b0460c9af0ad56ed4a56ef0bebd - Patch
References () https://git.kernel.org/stable/c/2e6d9f381c1ed844531a577783fc352de7a44c8a - () https://git.kernel.org/stable/c/2e6d9f381c1ed844531a577783fc352de7a44c8a - Patch
References () https://git.kernel.org/stable/c/d11d2ded293976a1a0d9d9471827a44dc9e3c63f - () https://git.kernel.org/stable/c/d11d2ded293976a1a0d9d9471827a44dc9e3c63f - Patch
References () https://git.kernel.org/stable/c/effd9b3c029ecdd853a11933dcf857f5a7ca8c3d - () https://git.kernel.org/stable/c/effd9b3c029ecdd853a11933dcf857f5a7ca8c3d - Patch
First Time Linux
Linux linux Kernel
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

15 Sep 2025, 15:22

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-15 15:15

Updated : 2025-12-04 13:42


NVD link : CVE-2022-50328

Mitre link : CVE-2022-50328

CVE.ORG link : CVE-2022-50328


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free