Zero Day Monitor
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1538 articles · 106541 vulns · 38/55 feeds (7d)
← Back to list
—
CVE-2026-23388

Squashfs: check metadata block offset is within range

Description

In the Linux kernel, the following vulnerability has been resolved: Squashfs: check metadata block offset is within range Syzkaller reports a "general protection fault in squashfs_copy_data" This is ultimately caused by a corrupted index look-up table, which produces a negative metadata block offset. This is subsequently passed to squashfs_copy_data (via squashfs_read_metadata) where the negative offset causes an out of bounds access. The fix is to check that the offset is within range in squashfs_read_metadata. This will trap this and other cases.

Affected Products

VendorProductVersions
LinuxLinuxf400e12656ab518be107febfe2315fb1eab5a342, f400e12656ab518be107febfe2315fb1eab5a342, f400e12656ab518be107febfe2315fb1eab5a342, f400e12656ab518be107febfe2315fb1eab5a342, f400e12656ab518be107febfe2315fb1eab5a342, f400e12656ab518be107febfe2315fb1eab5a342, 2.6.29, 6.1.167, 6.6.130, 6.12.77, 6.18.17, 6.19.7, 7.0-rc2, 7.0-rc1

References

  • https://git.kernel.org/stable/c/0c8ab092aec3ac4294940054772d30b511b16713
  • https://git.kernel.org/stable/c/6b847d65f5b0065e02080c61fad93d57d6686383
  • https://git.kernel.org/stable/c/9e9fa5ad37c9cbad73c165c7ff1e76e650825e7c
  • https://git.kernel.org/stable/c/01ee0bcc29864b78249308e8b35042b09bbf5fe3
  • https://git.kernel.org/stable/c/3b9499e7d677dd4366239a292238489a804936b2
  • https://git.kernel.org/stable/c/fdb24a820a5832ec4532273282cbd4f22c291a0d

Related News (2 articles)

Tier C
VulDB4h ago
CVE-2026-23388 | Linux Kernel up to 7.0-rc1 Squashfs squashfs_copy_data out-of-bounds
→ No new info (linked only)
Tier C
Linux Kernel CVEs6h ago
CVE-2026-23388: Squashfs: check metadata block offset is within range
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-125
Published3/25/2026
Last enriched3h agov3
Tags
CVE-2026-23388
Trending Score50
Source articles2
Independent2
Info Completeness8/14
Missing: cvss, epss, kev, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Version History

v3
Last enriched 3h ago
v3Tier C3h ago

Updated severity to CRITICAL, added affected version 7.0-rc1, and included new CWE-125.

severityaffectedVersionscweIdstags
via VulDB
v2Tier C5h ago

Added CVE-2026-23388, updated affected versions, and changed severity to HIGH.

descriptionaffectedVersionsseverityexploitAvailableactivelyExploited
via Linux Kernel CVEs
v16h ago

Initial creation