CVE-2026-23388
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
25/03/2026
Last modified:
24/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
Squashfs: check metadata block offset is within range<br />
<br />
Syzkaller reports a "general protection fault in squashfs_copy_data"<br />
<br />
This is ultimately caused by a corrupted index look-up table, which<br />
produces a negative metadata block offset.<br />
<br />
This is subsequently passed to squashfs_copy_data (via<br />
squashfs_read_metadata) where the negative offset causes an out of bounds<br />
access.<br />
<br />
The fix is to check that the offset is within range in<br />
squashfs_read_metadata. This will trap this and other cases.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.29.1 (including) | 5.10.253 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.203 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.167 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.130 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.77 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.17 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:2.6.29:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/01ee0bcc29864b78249308e8b35042b09bbf5fe3
- https://git.kernel.org/stable/c/0c8ab092aec3ac4294940054772d30b511b16713
- https://git.kernel.org/stable/c/3b9499e7d677dd4366239a292238489a804936b2
- https://git.kernel.org/stable/c/3f68a9457a6190814377577374da75f872e0a013
- https://git.kernel.org/stable/c/60f679f643f3f36a8571ea585e4ce5d93ef952b5
- https://git.kernel.org/stable/c/6b847d65f5b0065e02080c61fad93d57d6686383
- https://git.kernel.org/stable/c/9e9fa5ad37c9cbad73c165c7ff1e76e650825e7c
- https://git.kernel.org/stable/c/fdb24a820a5832ec4532273282cbd4f22c291a0d



