CVE-2026-23388Improper Validation of Specified Index, Position, or Offset in Input in Linux

Severity
6.3MEDIUM
No vector
EPSS
0.0%
top 90.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 25

Description

In the Linux kernel, the following vulnerability has been resolved: Squashfs: check metadata block offset is within range Syzkaller reports a "general protection fault in squashfs_copy_data" This is ultimately caused by a corrupted index look-up table, which produces a negative metadata block offset. This is subsequently passed to squashfs_copy_data (via squashfs_read_metadata) where the negative offset causes an out of bounds access. The fix is to check that the offset is within range in s

Affected Packages3 packages

Linuxlinux/linux_kernel2.6.296.1.167+4
Debianlinux/linux_kernel< 6.19.8-1
CVEListV5linux/linuxf400e12656ab518be107febfe2315fb1eab5a3420c8ab092aec3ac4294940054772d30b511b16713+6

🔴Vulnerability Details

4
CVEList
Squashfs: check metadata block offset is within range2026-03-25
OSV
CVE-2026-23388: In the Linux kernel, the following vulnerability has been resolved: Squashfs: check metadata block offset is within range Syzkaller reports a "general2026-03-25
GHSA
GHSA-3667-r4r3-59jh: In the Linux kernel, the following vulnerability has been resolved: Squashfs: check metadata block offset is within range Syzkaller reports a "gener2026-03-25
OSV
Squashfs: check metadata block offset is within range2026-03-25

📋Vendor Advisories

3
Red Hat
kernel: Squashfs: check metadata block offset is within range2026-03-25
Microsoft
Squashfs: check metadata block offset is within range2026-03-10
Debian
CVE-2026-23388: linux - In the Linux kernel, the following vulnerability has been resolved: Squashfs: c...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23388 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23388 — Linux vulnerability | cvebase