CVE-2022-50835Improper Update of Reference Count in Linux

Severity
3.3LOW
No vector
EPSS
0.0%
top 92.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: jbd2: add miss release buffer head in fc_do_one_pass() In fc_do_one_pass() miss release buffer head after use which will lead to reference count leak.

Affected Packages4 packages

Linuxlinux/linux_kernel5.10.05.10.150+3
Debianlinux/linux_kernel< 5.10.158-1+3
CVEListV5linux/linux5b849b5f96b47d82b5a432d8b91a8ad260e1de46e65506ff181fc176088f32117d69b9cb1ddda777+5
debiandebian/linux< linux 6.0.3-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2022-50835: In the Linux kernel, the following vulnerability has been resolved: jbd2: add miss release buffer head in fc_do_one_pass() In fc_do_one_pass() miss re2025-12-30
GHSA
GHSA-q896-33p3-px23: In the Linux kernel, the following vulnerability has been resolved: jbd2: add miss release buffer head in fc_do_one_pass() In fc_do_one_pass() miss2025-12-30
OSV
jbd2: add miss release buffer head in fc_do_one_pass()2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: jbd2: add miss release buffer head in fc_do_one_pass()2025-12-30
Debian
CVE-2022-50835: linux - In the Linux kernel, the following vulnerability has been resolved: jbd2: add m...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50835 Impact, Exploitability, and Mitigation Steps | Wiz