{"id":"CVE-2022-49993","summary":"loop: Check for overflow while configuring loop","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nloop: Check for overflow while configuring loop\n\nThe userspace can configure a loop using an ioctl call, wherein\na configuration of type loop_config is passed (see lo_ioctl()'s\ncase on line 1550 of drivers/block/loop.c). This proceeds to call\nloop_configure() which in turn calls loop_set_status_from_info()\n(see line 1050 of loop.c), passing &config-\u003einfo which is of type\nloop_info64*. This function then sets the appropriate values, like\nthe offset.\n\nloop_device has lo_offset of type loff_t (see line 52 of loop.c),\nwhich is typdef-chained to long long, whereas loop_info64 has\nlo_offset of type __u64 (see line 56 of include/uapi/linux/loop.h).\n\nThe function directly copies offset from info to the device as\nfollows (See line 980 of loop.c):\n\tlo-\u003elo_offset = info-\u003elo_offset;\n\nThis results in an overflow, which triggers a warning in iomap_iter()\ndue to a call to iomap_iter_done() which has:\n\tWARN_ON_ONCE(iter-\u003eiomap.offset \u003e iter-\u003epos);\n\nThus, check for negative value during loop_set_status_from_info().\n\nBug report: https://syzkaller.appspot.com/bug?id=c620fe14aac810396d3c3edc9ad73848bf69a29e","modified":"2026-04-03T13:14:50.044905Z","published":"2025-06-18T11:00:53.487Z","related":["SUSE-SU-2025:02264-1","SUSE-SU-2025:02308-1","SUSE-SU-2025:02320-1","SUSE-SU-2025:02321-1","SUSE-SU-2025:02322-1","SUSE-SU-2025:02537-1","SUSE-SU-2025:02846-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49993.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0455bef69028c65065f16bb04635591b2374249b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/18e28817cb516b39de6281f6db9b0618b2cc7b42"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6858933131d0dadac071c4d33335a9ea4b8e76cf"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9be7fa7ead18a48940df7b59d993bbc8b9055c15"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a217715338fd48f72114725aa7a40e484a781ca7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/adf0112d9b8acb03485624220b4934f69bf13369"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b40877b8562c5720d0a7fce20729f56b75a3dede"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c490a0b5a4f36da3918181a8acdc6991d967c5f3"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49993.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49993"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2"},{"fixed":"18e28817cb516b39de6281f6db9b0618b2cc7b42"},{"fixed":"adf0112d9b8acb03485624220b4934f69bf13369"},{"fixed":"a217715338fd48f72114725aa7a40e484a781ca7"},{"fixed":"b40877b8562c5720d0a7fce20729f56b75a3dede"},{"fixed":"6858933131d0dadac071c4d33335a9ea4b8e76cf"},{"fixed":"0455bef69028c65065f16bb04635591b2374249b"},{"fixed":"9be7fa7ead18a48940df7b59d993bbc8b9055c15"},{"fixed":"c490a0b5a4f36da3918181a8acdc6991d967c5f3"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49993.json"}}],"schema_version":"1.7.5"}