Fixed
Created: Dec 10, 2025
Updated: Dec 11, 2025
Resolved Date: Dec 10, 2025
Found In Version: 10.22.33.1
Fix Version: 10.22.33.8
Severity: Standard
Applicable for: Wind River Linux LTS 22
Component/s: Kernel
In the Linux kernel, the following vulnerability has been resolved:[EOL][EOL]loop: loop_set_status_from_info() check before assignment[EOL][EOL]In loop_set_status_from_info(), lo->lo_offset and lo->lo_sizelimit should[EOL]be checked before reassignment, because if an overflow error occurs, the[EOL]original correct value will be changed to the wrong value, and it will not[EOL]be changed back.[EOL][EOL]More, the original patch did not solve the problem, the value was set and[EOL]ioctl returned an error, but the subsequent io used the value in the loop[EOL]driver, which still caused an alarm:[EOL][EOL]loop_handle_cmd[EOL] do_req_filebacked[EOL] loff_t pos = ((loff_t) blk_rq_pos(rq) << 9) + lo->lo_offset;[EOL] lo_rw_aio[EOL] cmd->iocb.ki_pos = pos