CVE-2026-23388

In the Linux kernel, the following vulnerability has been resolved: Squashfs: check metadata block offset is within range Syzkaller reports a "general protection fault in squashfs_copy_data" This is ultimately caused by a corrupted index look-up table, which produces a negative metadata block offset. This is subsequently passed to squashfs_copy_data (via squashfs_read_metadata) where the negative offset causes an out of bounds access. The fix is to check that the offset is within range in squashfs_read_metadata. This will trap this and other cases.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.29:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*

History

24 Apr 2026, 18:45

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.29:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/01ee0bcc29864b78249308e8b35042b09bbf5fe3 - () https://git.kernel.org/stable/c/01ee0bcc29864b78249308e8b35042b09bbf5fe3 - Patch
References () https://git.kernel.org/stable/c/0c8ab092aec3ac4294940054772d30b511b16713 - () https://git.kernel.org/stable/c/0c8ab092aec3ac4294940054772d30b511b16713 - Patch
References () https://git.kernel.org/stable/c/3b9499e7d677dd4366239a292238489a804936b2 - () https://git.kernel.org/stable/c/3b9499e7d677dd4366239a292238489a804936b2 - Patch
References () https://git.kernel.org/stable/c/3f68a9457a6190814377577374da75f872e0a013 - () https://git.kernel.org/stable/c/3f68a9457a6190814377577374da75f872e0a013 - Patch
References () https://git.kernel.org/stable/c/60f679f643f3f36a8571ea585e4ce5d93ef952b5 - () https://git.kernel.org/stable/c/60f679f643f3f36a8571ea585e4ce5d93ef952b5 - Patch
References () https://git.kernel.org/stable/c/6b847d65f5b0065e02080c61fad93d57d6686383 - () https://git.kernel.org/stable/c/6b847d65f5b0065e02080c61fad93d57d6686383 - Patch
References () https://git.kernel.org/stable/c/9e9fa5ad37c9cbad73c165c7ff1e76e650825e7c - () https://git.kernel.org/stable/c/9e9fa5ad37c9cbad73c165c7ff1e76e650825e7c - Patch
References () https://git.kernel.org/stable/c/fdb24a820a5832ec4532273282cbd4f22c291a0d - () https://git.kernel.org/stable/c/fdb24a820a5832ec4532273282cbd4f22c291a0d - Patch
CWE CWE-125
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1

18 Apr 2026, 09:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/3f68a9457a6190814377577374da75f872e0a013 -
  • () https://git.kernel.org/stable/c/60f679f643f3f36a8571ea585e4ce5d93ef952b5 -
Summary
  • (es) En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta: Squashfs: comprobar que el desplazamiento del bloque de metadatos está dentro del rango Syzkaller informa de un 'fallo de protección general en squashfs_copy_data' Esto es causado en última instancia por una tabla de búsqueda de índices corrupta, que produce un desplazamiento de bloque de metadatos negativo. Esto se pasa posteriormente a squashfs_copy_data (a través de squashfs_read_metadata) donde el desplazamiento negativo causa un acceso fuera de límites. La solución es comprobar que el desplazamiento está dentro del rango en squashfs_read_metadata. Esto atrapará este y otros casos.

25 Mar 2026, 11:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-25 11:16

Updated : 2026-04-24 18:45


NVD link : CVE-2026-23388

Mitre link : CVE-2026-23388

CVE.ORG link : CVE-2026-23388


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read