CVE-2022-49993

Source
https://cve.org/CVERecord?id=CVE-2022-49993
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49993.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-49993
Downstream
Related
Published
2025-06-18T11:00:53.487Z
Modified
2026-04-03T13:14:50.044905Z
Summary
loop: Check for overflow while configuring loop
Details

In the Linux kernel, the following vulnerability has been resolved:

loop: Check for overflow while configuring loop

The userspace can configure a loop using an ioctl call, wherein a configuration of type loopconfig is passed (see loioctl()'s case on line 1550 of drivers/block/loop.c). This proceeds to call loopconfigure() which in turn calls loopsetstatusfrominfo() (see line 1050 of loop.c), passing &config->info which is of type loopinfo64*. This function then sets the appropriate values, like the offset.

loopdevice has looffset of type lofft (see line 52 of loop.c), which is typdef-chained to long long, whereas loopinfo64 has lo_offset of type __u64 (see line 56 of include/uapi/linux/loop.h).

The function directly copies offset from info to the device as follows (See line 980 of loop.c): lo->looffset = info->looffset;

This results in an overflow, which triggers a warning in iomapiter() due to a call to iomapiterdone() which has: WARNON_ONCE(iter->iomap.offset > iter->pos);

Thus, check for negative value during loopsetstatusfrominfo().

Bug report: https://syzkaller.appspot.com/bug?id=c620fe14aac810396d3c3edc9ad73848bf69a29e

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49993.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
18e28817cb516b39de6281f6db9b0618b2cc7b42
Fixed
adf0112d9b8acb03485624220b4934f69bf13369
Fixed
a217715338fd48f72114725aa7a40e484a781ca7
Fixed
b40877b8562c5720d0a7fce20729f56b75a3dede
Fixed
6858933131d0dadac071c4d33335a9ea4b8e76cf
Fixed
0455bef69028c65065f16bb04635591b2374249b
Fixed
9be7fa7ead18a48940df7b59d993bbc8b9055c15
Fixed
c490a0b5a4f36da3918181a8acdc6991d967c5f3

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49993.json"