CVE-2022-49993
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/06/2025
Last modified:
14/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
loop: Check for overflow while configuring loop<br />
<br />
The userspace can configure a loop using an ioctl call, wherein<br />
a configuration of type loop_config is passed (see lo_ioctl()&#39;s<br />
case on line 1550 of drivers/block/loop.c). This proceeds to call<br />
loop_configure() which in turn calls loop_set_status_from_info()<br />
(see line 1050 of loop.c), passing &config->info which is of type<br />
loop_info64*. This function then sets the appropriate values, like<br />
the offset.<br />
<br />
loop_device has lo_offset of type loff_t (see line 52 of loop.c),<br />
which is typdef-chained to long long, whereas loop_info64 has<br />
lo_offset of type __u64 (see line 56 of include/uapi/linux/loop.h).<br />
<br />
The function directly copies offset from info to the device as<br />
follows (See line 980 of loop.c):<br />
lo->lo_offset = info->lo_offset;<br />
<br />
This results in an overflow, which triggers a warning in iomap_iter()<br />
due to a call to iomap_iter_done() which has:<br />
WARN_ON_ONCE(iter->iomap.offset > iter->pos);<br />
<br />
Thus, check for negative value during loop_set_status_from_info().<br />
<br />
Bug report: https://syzkaller.appspot.com/bug?id=c620fe14aac810396d3c3edc9ad73848bf69a29e
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.9.327 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.10 (including) | 4.14.292 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.312 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.274 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.140 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.64 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.19.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0455bef69028c65065f16bb04635591b2374249b
- https://git.kernel.org/stable/c/18e28817cb516b39de6281f6db9b0618b2cc7b42
- https://git.kernel.org/stable/c/6858933131d0dadac071c4d33335a9ea4b8e76cf
- https://git.kernel.org/stable/c/9be7fa7ead18a48940df7b59d993bbc8b9055c15
- https://git.kernel.org/stable/c/a217715338fd48f72114725aa7a40e484a781ca7
- https://git.kernel.org/stable/c/adf0112d9b8acb03485624220b4934f69bf13369
- https://git.kernel.org/stable/c/b40877b8562c5720d0a7fce20729f56b75a3dede
- https://git.kernel.org/stable/c/c490a0b5a4f36da3918181a8acdc6991d967c5f3



