CVE-2026-23141
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
14/02/2026
Last modified:
25/03/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
btrfs: send: check for inline extents in range_is_hole_in_parent()<br />
<br />
Before accessing the disk_bytenr field of a file extent item we need<br />
to check if we are dealing with an inline extent.<br />
This is because for inline extents their data starts at the offset of<br />
the disk_bytenr field. So accessing the disk_bytenr<br />
means we are accessing inline data or in case the inline data is less<br />
than 8 bytes we can actually cause an invalid<br />
memory access if this inline extent item is the first item in the leaf<br />
or access metadata from other items.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.11 (including) | 6.6.122 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.67 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/08b096c1372cd69627f4f559fb47c9fb67a52b39
- https://git.kernel.org/stable/c/39f83f10772310ba4a77f2b5256aaf36994ef7e8
- https://git.kernel.org/stable/c/d948055bd46a9c14d1d4217aed65c5c258c32903
- https://git.kernel.org/stable/c/db00636643e66898d79f2530ac9c56ebd5eca369
- https://git.kernel.org/stable/c/f2dc6ab3a14c2d2eb0b14783427eb9b03bf631c9



