CVE-2022-50126
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | 2.6.19 |
| linux | linux_kernel | 2.6.19 |
| linux | linux_kernel | 2.6.19 |
| linux | linux_kernel | 2.6.19 |
| linux | linux_kernel | 2.6.19 |
| linux | linux_kernel | 2.6.19 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-617 | The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an assertion failure in the Linux kernel's jbd2 journaling system. It occurs when the journal aborts during certain file operations, leading to a failed assertion 'jh->b_frozen_data == NULL' in the function jbd2_journal_dirty_metadata(). This happens because the function __jbd2_journal_refile_buffer() is called while holding a lock, but the check for whether the handle is aborted is done outside the locked area, causing inconsistent state and a kernel bug.
How can this vulnerability impact me? :
This vulnerability can cause a kernel BUG and crash the system when certain file operations are performed, specifically during journal abort scenarios in the jbd2 journaling system. This can lead to system instability or denial of service due to kernel panics.