Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-50835

Опубликовано: 30 дек. 2025
Источник: debian
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: jbd2: add miss release buffer head in fc_do_one_pass() In fc_do_one_pass() miss release buffer head after use which will lead to reference count leak.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.0.3-1package
linuxfixed5.10.158-1bullseyepackage

Примечания

  • https://git.kernel.org/linus/dfff66f30f66b9524b661f311bbed8ff3d2ca49f (6.1-rc1)

EPSS

Процентиль: 6%
0.00026
Низкий

Связанные уязвимости

ubuntu
около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: jbd2: add miss release buffer head in fc_do_one_pass() In fc_do_one_pass() miss release buffer head after use which will lead to reference count leak.

nvd
около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: jbd2: add miss release buffer head in fc_do_one_pass() In fc_do_one_pass() miss release buffer head after use which will lead to reference count leak.

github
около 1 месяца назад

In the Linux kernel, the following vulnerability has been resolved: jbd2: add miss release buffer head in fc_do_one_pass() In fc_do_one_pass() miss release buffer head after use which will lead to reference count leak.

suse-cvrf
10 дней назад

Security update for the Linux Kernel

EPSS

Процентиль: 6%
0.00026
Низкий