CVE-2022-50328Use After Free in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 93.01%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 15

Description

In the Linux kernel, the following vulnerability has been resolved: jbd2: fix potential use-after-free in jbd2_fc_wait_bufs In 'jbd2_fc_wait_bufs' use 'bh' after put buffer head reference count which may lead to use-after-free. So judge buffer if uptodate before put buffer head reference count.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel5.115.15.75+3
Debianlinux/linux_kernel< 5.10.158-1+3
CVEListV5linux/linuxff780b91efe901b8eecd8114785abae5341820ad1d4d16daec2a6689b6d3fbfc7d2078643adc6619+5
debiandebian/linux< linux 6.0.3-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2022-50328: In the Linux kernel, the following vulnerability has been resolved: jbd2: fix potential use-after-free in jbd2_fc_wait_bufs In 'jbd2_fc_wait_bufs' use2025-09-15
GHSA
GHSA-72g6-vhcp-944p: In the Linux kernel, the following vulnerability has been resolved: jbd2: fix potential use-after-free in jbd2_fc_wait_bufs In 'jbd2_fc_wait_bufs' u2025-09-15

📋Vendor Advisories

3
Red Hat
kernel: jbd2: fix potential use-after-free in jbd2_fc_wait_bufs2025-09-15
Ivanti
Ivanti Security Advisory: CVE-2024-503282024-11-12
Debian
CVE-2022-50328: linux - In the Linux kernel, the following vulnerability has been resolved: jbd2: fix p...2022
CVE-2022-50328 — Use After Free in Linux | cvebase