In the Linux kernel, the following vulnerability has been resolved:
jbd2: fix potential use-after-free in jbd2fcwait_bufs
In 'jbd2fcwait_bufs' use 'bh' after put buffer head reference count which may lead to use-after-free. So judge buffer if uptodate before put buffer head reference count.
[
{
"id": "CVE-2022-50328-16ba84dd",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@243d1a5d505d0b0460c9af0ad56ed4a56ef0bebd",
"deprecated": false,
"signature_version": "v1",
"target": {
"function": "jbd2_fc_wait_bufs",
"file": "fs/jbd2/journal.c"
},
"digest": {
"function_hash": "310107252126627722710841053931413767181",
"length": 358.0
},
"signature_type": "Function"
},
{
"id": "CVE-2022-50328-1d1daf8d",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@effd9b3c029ecdd853a11933dcf857f5a7ca8c3d",
"deprecated": false,
"signature_version": "v1",
"target": {
"function": "jbd2_fc_wait_bufs",
"file": "fs/jbd2/journal.c"
},
"digest": {
"function_hash": "310107252126627722710841053931413767181",
"length": 358.0
},
"signature_type": "Function"
},
{
"id": "CVE-2022-50328-32c8c879",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1d4d16daec2a6689b6d3fbfc7d2078643adc6619",
"deprecated": false,
"signature_version": "v1",
"target": {
"function": "jbd2_fc_wait_bufs",
"file": "fs/jbd2/journal.c"
},
"digest": {
"function_hash": "310107252126627722710841053931413767181",
"length": 358.0
},
"signature_type": "Function"
},
{
"id": "CVE-2022-50328-3fc1836b",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@243d1a5d505d0b0460c9af0ad56ed4a56ef0bebd",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "fs/jbd2/journal.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"150902620548376551086756421580442325364",
"57488573532229462980700257266457031356",
"295261789785611018689126499794420407979",
"278314582682172381646603862820093749161",
"248092571414684014228387633871429561319",
"148312230186956780925890775696086858616",
"54587154687687282125601855561513747742",
"315297764493019680029647061223872528043",
"267868390585593816517915983992887850017"
]
},
"signature_type": "Line"
},
{
"id": "CVE-2022-50328-5ea6e1cd",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d11d2ded293976a1a0d9d9471827a44dc9e3c63f",
"deprecated": false,
"signature_version": "v1",
"target": {
"function": "jbd2_fc_wait_bufs",
"file": "fs/jbd2/journal.c"
},
"digest": {
"function_hash": "310107252126627722710841053931413767181",
"length": 358.0
},
"signature_type": "Function"
},
{
"id": "CVE-2022-50328-b091c4b9",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2e6d9f381c1ed844531a577783fc352de7a44c8a",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "fs/jbd2/journal.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"150902620548376551086756421580442325364",
"57488573532229462980700257266457031356",
"295261789785611018689126499794420407979",
"278314582682172381646603862820093749161",
"248092571414684014228387633871429561319",
"148312230186956780925890775696086858616",
"54587154687687282125601855561513747742",
"315297764493019680029647061223872528043",
"267868390585593816517915983992887850017"
]
},
"signature_type": "Line"
},
{
"id": "CVE-2022-50328-c5f900ce",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1d4d16daec2a6689b6d3fbfc7d2078643adc6619",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "fs/jbd2/journal.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"150902620548376551086756421580442325364",
"57488573532229462980700257266457031356",
"295261789785611018689126499794420407979",
"278314582682172381646603862820093749161",
"248092571414684014228387633871429561319",
"148312230186956780925890775696086858616",
"54587154687687282125601855561513747742",
"315297764493019680029647061223872528043",
"267868390585593816517915983992887850017"
]
},
"signature_type": "Line"
},
{
"id": "CVE-2022-50328-e8506f3c",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d11d2ded293976a1a0d9d9471827a44dc9e3c63f",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "fs/jbd2/journal.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"150902620548376551086756421580442325364",
"57488573532229462980700257266457031356",
"295261789785611018689126499794420407979",
"278314582682172381646603862820093749161",
"248092571414684014228387633871429561319",
"148312230186956780925890775696086858616",
"54587154687687282125601855561513747742",
"315297764493019680029647061223872528043",
"267868390585593816517915983992887850017"
]
},
"signature_type": "Line"
},
{
"id": "CVE-2022-50328-f0f39ce8",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2e6d9f381c1ed844531a577783fc352de7a44c8a",
"deprecated": false,
"signature_version": "v1",
"target": {
"function": "jbd2_fc_wait_bufs",
"file": "fs/jbd2/journal.c"
},
"digest": {
"function_hash": "310107252126627722710841053931413767181",
"length": 358.0
},
"signature_type": "Function"
},
{
"id": "CVE-2022-50328-f872930a",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@effd9b3c029ecdd853a11933dcf857f5a7ca8c3d",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "fs/jbd2/journal.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"150902620548376551086756421580442325364",
"57488573532229462980700257266457031356",
"295261789785611018689126499794420407979",
"278314582682172381646603862820093749161",
"248092571414684014228387633871429561319",
"148312230186956780925890775696086858616",
"54587154687687282125601855561513747742",
"315297764493019680029647061223872528043",
"267868390585593816517915983992887850017"
]
},
"signature_type": "Line"
}
]