CVE-2022-49739
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/03/2025
Last modified:
30/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
gfs2: Always check inode size of inline inodes<br />
<br />
Check if the inode size of stuffed (inline) inodes is within the allowed<br />
range when reading inodes from disk (gfs2_dinode_in()). This prevents<br />
us from on-disk corruption.<br />
<br />
The two checks in stuffed_readpage() and gfs2_unstuffer_page() that just<br />
truncate inline data to the maximum allowed size don&#39;t actually make<br />
sense, and they can be removed now as well.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.19.280 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.240 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.177 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.93 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.11 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/45df749f827c286adbc951f2a4865b67f0442ba9
- https://git.kernel.org/stable/c/46c9088cabd4d0469fdb61ac2a9c5003057fe94d
- https://git.kernel.org/stable/c/4d4cb76636134bf9a0c9c3432dae936f99954586
- https://git.kernel.org/stable/c/70376c7ff31221f1d21db5611d8209e677781d3a
- https://git.kernel.org/stable/c/7c414f6f06e9a3934901b6edc3177ae5a1e07094
- https://git.kernel.org/stable/c/d458a0984429c2d47e60254f5bc4119cbafe83a2



