CVE-2022-49739

In the Linux kernel, the following vulnerability has been resolved: gfs2: Always check inode size of inline inodes Check if the inode size of stuffed (inline) inodes is within the allowed range when reading inodes from disk (gfs2_dinode_in()). This prevents us from on-disk corruption. The two checks in stuffed_readpage() and gfs2_unstuffer_page() that just truncate inline data to the maximum allowed size don't actually make sense, and they can be removed now as well.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

30 Oct 2025, 15:36

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: gfs2: Comprobar siempre el tamaño de los inodos en línea. Se comprueba si el tamaño de los inodos rellenos (en línea) está dentro del rango permitido al leer inodos del disco (gfs2_dinode_in()). Esto evita la corrupción en disco. Las dos comprobaciones en stuffed_readpage() y gfs2_unstuffer_page(), que simplemente truncan los datos en línea al tamaño máximo permitido, no tienen sentido y también se pueden eliminar.
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/45df749f827c286adbc951f2a4865b67f0442ba9 - () https://git.kernel.org/stable/c/45df749f827c286adbc951f2a4865b67f0442ba9 - Patch
References () https://git.kernel.org/stable/c/46c9088cabd4d0469fdb61ac2a9c5003057fe94d - () https://git.kernel.org/stable/c/46c9088cabd4d0469fdb61ac2a9c5003057fe94d - Patch
References () https://git.kernel.org/stable/c/4d4cb76636134bf9a0c9c3432dae936f99954586 - () https://git.kernel.org/stable/c/4d4cb76636134bf9a0c9c3432dae936f99954586 - Patch
References () https://git.kernel.org/stable/c/70376c7ff31221f1d21db5611d8209e677781d3a - () https://git.kernel.org/stable/c/70376c7ff31221f1d21db5611d8209e677781d3a - Patch
References () https://git.kernel.org/stable/c/7c414f6f06e9a3934901b6edc3177ae5a1e07094 - () https://git.kernel.org/stable/c/7c414f6f06e9a3934901b6edc3177ae5a1e07094 - Patch
References () https://git.kernel.org/stable/c/d458a0984429c2d47e60254f5bc4119cbafe83a2 - () https://git.kernel.org/stable/c/d458a0984429c2d47e60254f5bc4119cbafe83a2 - Patch

27 Mar 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-27 17:15

Updated : 2025-10-30 15:36


NVD link : CVE-2022-49739

Mitre link : CVE-2022-49739

CVE.ORG link : CVE-2022-49739


JSON object : View

Products Affected

linux

  • linux_kernel