CVE-2022-50328

Source
https://cve.org/CVERecord?id=CVE-2022-50328
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50328.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50328
Downstream
Related
Published
2025-09-15T14:49:30.483Z
Modified
2026-04-02T08:28:25.196168Z
Summary
jbd2: fix potential use-after-free in jbd2_fc_wait_bufs
Details

In the Linux kernel, the following vulnerability has been resolved:

jbd2: fix potential use-after-free in jbd2fcwait_bufs

In 'jbd2fcwait_bufs' use 'bh' after put buffer head reference count which may lead to use-after-free. So judge buffer if uptodate before put buffer head reference count.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50328.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ff780b91efe901b8eecd8114785abae5341820ad
Fixed
1d4d16daec2a6689b6d3fbfc7d2078643adc6619
Fixed
d11d2ded293976a1a0d9d9471827a44dc9e3c63f
Fixed
2e6d9f381c1ed844531a577783fc352de7a44c8a
Fixed
effd9b3c029ecdd853a11933dcf857f5a7ca8c3d
Fixed
243d1a5d505d0b0460c9af0ad56ed4a56ef0bebd

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50328.json"