Home

Description

In the Linux kernel, the following vulnerability has been resolved: jbd2: fix potential use-after-free in jbd2_fc_wait_bufs In 'jbd2_fc_wait_bufs' use 'bh' after put buffer head reference count which may lead to use-after-free. So judge buffer if uptodate before put buffer head reference count.

PUBLISHED Reserved 2025-09-15 | Published 2025-09-15 | Updated 2025-09-15 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 1d4d16daec2a6689b6d3fbfc7d2078643adc6619
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before d11d2ded293976a1a0d9d9471827a44dc9e3c63f
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 2e6d9f381c1ed844531a577783fc352de7a44c8a
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before effd9b3c029ecdd853a11933dcf857f5a7ca8c3d
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 243d1a5d505d0b0460c9af0ad56ed4a56ef0bebd
affected

Default status
affected

5.10.150 (semver)
unaffected

5.15.75 (semver)
unaffected

5.19.17 (semver)
unaffected

6.0.3 (semver)
unaffected

6.1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/1d4d16daec2a6689b6d3fbfc7d2078643adc6619

git.kernel.org/...c/d11d2ded293976a1a0d9d9471827a44dc9e3c63f

git.kernel.org/...c/2e6d9f381c1ed844531a577783fc352de7a44c8a

git.kernel.org/...c/effd9b3c029ecdd853a11933dcf857f5a7ca8c3d

git.kernel.org/...c/243d1a5d505d0b0460c9af0ad56ed4a56ef0bebd

cve.org (CVE-2022-50328)

nvd.nist.gov (CVE-2022-50328)

Download JSON