SB2025121070 - Use-after-free in Linux kernel ext4
Published: December 10, 2025 Updated: December 12, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2022-50673)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ext4_truncate() function in fs/ext4/inode.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/026a4490b5381229a30f23d073b58e8e35ee6858
- https://git.kernel.org/stable/c/7223d5e75f26352354ea2c0ccf8b579821b52adf
- https://git.kernel.org/stable/c/7908b8a541b1578cc61b4da7f19b604a931441da
- https://git.kernel.org/stable/c/7f801a1593cb957f73659732836b2dafbdfc7709
- https://git.kernel.org/stable/c/a71248b1accb2b42e4980afef4fa4a27fa0e36f5
- https://git.kernel.org/stable/c/c2bdbd4c69308835d1b6f6ba74feeccbfe113478
- https://git.kernel.org/stable/c/cf0e0817b0f925b70d101d7014ea81b7094e1159
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.87