In the Linux kernel, the following vulnerability has been resolved:
btrfs: send: check for inline extents in range_is_hole_in_parent()
Before accessing the disk_bytenr field of a file extent item we need
to check if we are dealing with an inline extent.
This is because for inline extents their data starts at the offset of
the disk_bytenr field. So accessing the disk_bytenr
means we are accessing inline data or in case the inline data is less
than 8 bytes we can actually cause an invalid
memory access if this inline extent item is the first item in the leaf
or access metadata from other items.
References
Configurations
Configuration 1 (hide)
|
History
17 Mar 2026, 21:13
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | NVD-CWE-noinfo | |
| First Time |
Linux
Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/08b096c1372cd69627f4f559fb47c9fb67a52b39 - Patch | |
| References | () https://git.kernel.org/stable/c/39f83f10772310ba4a77f2b5256aaf36994ef7e8 - Patch | |
| References | () https://git.kernel.org/stable/c/db00636643e66898d79f2530ac9c56ebd5eca369 - Patch | |
| References | () https://git.kernel.org/stable/c/f2dc6ab3a14c2d2eb0b14783427eb9b03bf631c9 - Patch |
18 Feb 2026, 17:52
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
14 Feb 2026, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-14 16:15
Updated : 2026-03-17 21:13
NVD link : CVE-2026-23141
Mitre link : CVE-2026-23141
CVE.ORG link : CVE-2026-23141
JSON object : View
Products Affected
linux
- linux_kernel
CWE
