CVE-2022-50328 — Use After Free in Linux
Severity
7.8HIGHNVD
EPSS
0.0%
top 93.01%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 15
Description
In the Linux kernel, the following vulnerability has been resolved:
jbd2: fix potential use-after-free in jbd2_fc_wait_bufs
In 'jbd2_fc_wait_bufs' use 'bh' after put buffer head reference count
which may lead to use-after-free.
So judge buffer if uptodate before put buffer head reference count.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages4 packages
▶CVEListV5linux/linuxff780b91efe901b8eecd8114785abae5341820ad — 1d4d16daec2a6689b6d3fbfc7d2078643adc6619+5
Patches
🔴Vulnerability Details
2OSV▶
CVE-2022-50328: In the Linux kernel, the following vulnerability has been resolved: jbd2: fix potential use-after-free in jbd2_fc_wait_bufs In 'jbd2_fc_wait_bufs' use↗2025-09-15
GHSA▶
GHSA-72g6-vhcp-944p: In the Linux kernel, the following vulnerability has been resolved:
jbd2: fix potential use-after-free in jbd2_fc_wait_bufs
In 'jbd2_fc_wait_bufs' u↗2025-09-15