{"id":"CVE-2022-49739","summary":"gfs2: Always check inode size of inline inodes","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Always check inode size of inline inodes\n\nCheck if the inode size of stuffed (inline) inodes is within the allowed\nrange when reading inodes from disk (gfs2_dinode_in()).  This prevents\nus from on-disk corruption.\n\nThe two checks in stuffed_readpage() and gfs2_unstuffer_page() that just\ntruncate inline data to the maximum allowed size don't actually make\nsense, and they can be removed now as well.","modified":"2026-04-11T12:44:26.912850Z","published":"2025-03-27T16:42:51.609Z","related":["SUSE-SU-2025:1176-1","SUSE-SU-2025:1183-1","SUSE-SU-2025:1194-1","SUSE-SU-2025:1195-1","SUSE-SU-2025:1241-1","SUSE-SU-2025:1263-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49739.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/45df749f827c286adbc951f2a4865b67f0442ba9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/46c9088cabd4d0469fdb61ac2a9c5003057fe94d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4d4cb76636134bf9a0c9c3432dae936f99954586"},{"type":"WEB","url":"https://git.kernel.org/stable/c/70376c7ff31221f1d21db5611d8209e677781d3a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7c414f6f06e9a3934901b6edc3177ae5a1e07094"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d458a0984429c2d47e60254f5bc4119cbafe83a2"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49739.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49739"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"b3b94faa5fe5968827ba0640ee9fba4b3e7f736e"},{"fixed":"45df749f827c286adbc951f2a4865b67f0442ba9"},{"fixed":"4d4cb76636134bf9a0c9c3432dae936f99954586"},{"fixed":"7c414f6f06e9a3934901b6edc3177ae5a1e07094"},{"fixed":"46c9088cabd4d0469fdb61ac2a9c5003057fe94d"},{"fixed":"d458a0984429c2d47e60254f5bc4119cbafe83a2"},{"fixed":"70376c7ff31221f1d21db5611d8209e677781d3a"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49739.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.19"},{"fixed":"4.19.280"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.240"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.177"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.93"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.11"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49739.json"}}],"schema_version":"1.7.5"}