In the Linux kernel, the following vulnerability has been resolved:
gfs2: Always check inode size of inline inodes
Check if the inode size of stuffed (inline) inodes is within the allowed
range when reading inodes from disk (gfs2_dinode_in()).  This prevents
us from on-disk corruption.
The two checks in stuffed_readpage() and gfs2_unstuffer_page() that just
truncate inline data to the maximum allowed size don't actually make
sense, and they can be removed now as well.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    30 Oct 2025, 15:36
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | NVD-CWE-noinfo | |
| First Time | Linux linux Kernel Linux | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 5.5 | 
| Summary | 
 | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| References | () https://git.kernel.org/stable/c/45df749f827c286adbc951f2a4865b67f0442ba9 - Patch | |
| References | () https://git.kernel.org/stable/c/46c9088cabd4d0469fdb61ac2a9c5003057fe94d - Patch | |
| References | () https://git.kernel.org/stable/c/4d4cb76636134bf9a0c9c3432dae936f99954586 - Patch | |
| References | () https://git.kernel.org/stable/c/70376c7ff31221f1d21db5611d8209e677781d3a - Patch | |
| References | () https://git.kernel.org/stable/c/7c414f6f06e9a3934901b6edc3177ae5a1e07094 - Patch | |
| References | () https://git.kernel.org/stable/c/d458a0984429c2d47e60254f5bc4119cbafe83a2 - Patch | 
27 Mar 2025, 17:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-03-27 17:15
Updated : 2025-10-30 15:36
NVD link : CVE-2022-49739
Mitre link : CVE-2022-49739
CVE.ORG link : CVE-2022-49739
JSON object : View
Products Affected
                linux
- linux_kernel
CWE
                