In the Linux kernel, the following vulnerability has been resolved: Squashfs: check metadata block offset is within range Syzkaller reports a "general protection fault in squashfs_copy_data" This is ultimately caused by a corrupted index look-up table, which produces a negative metadata block offset. This is subsequently passed to squashfs_copy_data (via squashfs_read_metadata) where the negative offset causes an out of bounds access. The fix is to check that the offset is within range in squashfs_read_metadata. This will trap this and other cases.
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux | f400e12656ab518be107febfe2315fb1eab5a342, f400e12656ab518be107febfe2315fb1eab5a342, f400e12656ab518be107febfe2315fb1eab5a342, f400e12656ab518be107febfe2315fb1eab5a342, f400e12656ab518be107febfe2315fb1eab5a342, f400e12656ab518be107febfe2315fb1eab5a342, 2.6.29, 6.1.167, 6.6.130, 6.12.77, 6.18.17, 6.19.7, 7.0-rc2, 7.0-rc1 |
Updated severity to CRITICAL, added affected version 7.0-rc1, and included new CWE-125.
Added CVE-2026-23388, updated affected versions, and changed severity to HIGH.
Initial creation