CVE-2022-50835
Description
In the Linux kernel, the following vulnerability has been resolved:
jbd2: add miss release buffer head in fc_do_one_pass()
In fc_do_one_pass() miss release buffer head after use which will lead to reference count leak.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A missing buffer head release in the jbd2 journaling code's fc_do_one_pass function causes a reference count leak, leading to a memory leak vulnerability.
Root
Cause The vulnerability resides in the Linux kernel's jbd2 journaling subsystem within the fc_do_one_pass() function. During fast commit processing, a buffer head is obtained but not released after use, resulting in a reference count leak [1]. This omission prevents the kernel from properly freeing the buffer memory, leading to a gradual memory leak over time.
Attack
Vector Local exploitation is possible by triggering the fast commit path of the jbd2 journaling layer. An attacker with unprivileged access to the system can repeatedly invoke filesystem operations that engage fast commits, causing the reference count leak to accumulate. No special network position or authentication beyond local access is required.
Impact
A successful attack gradually depletes system memory, potentially leading to denial-of-service (DoS) conditions. The memory leak reduces available memory for other processes and can eventually cause system instability or crashes if memory exhaustion occurs. The vulnerability does not provide code execution or privilege escalation directly.
Mitigation
Patches have been applied to the Linux kernel stable trees to address this issue [1][2]. Users should update to the latest stable kernel version that includes the fix. There is no known workaround other than applying the kernel update.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
5e65506ff181f56fcd0788f0d27c7bd35135d1f48116cbd34dfff66f30f66Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- git.kernel.org/stable/c/1f48116cbd3404898c9022892e114dd7cc3063c1nvd
- git.kernel.org/stable/c/27c7bd35135d5ab38b9138ecf186ce54a96c98d9nvd
- git.kernel.org/stable/c/56fcd0788f0d9243c1754bd6f80b8b327c4afeeenvd
- git.kernel.org/stable/c/dfff66f30f66b9524b661f311bbed8ff3d2ca49fnvd
- git.kernel.org/stable/c/e65506ff181fc176088f32117d69b9cb1ddda777nvd
News mentions
0No linked articles in our index yet.