Description
In the Linux kernel, the following vulnerability has been resolved:

Squashfs: check metadata block offset is within range

Syzkaller reports a "general protection fault in squashfs_copy_data"

This is ultimately caused by a corrupted index look-up table, which
produces a negative metadata block offset.

This is subsequently passed to squashfs_copy_data (via
squashfs_read_metadata) where the negative offset causes an out of bounds
access.

The fix is to check that the offset is within range in
squashfs_read_metadata. This will trap this and other cases.
Published: 2026-03-25
Score: 6.6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Kernel crash/Denial of Service
Action: Immediate Patch
AI Analysis

Impact

The vulnerability exists in the Linux kernel’s squashfs implementation. A corrupted index look‑up table can produce a negative metadata block offset that is subsequently passed to squashfs_copy_data. The negative offset results in an out‑of‑bounds memory access, triggering a general protection fault. Failure to detect this condition can cause the kernel to crash, effectively denying service to processes requiring access to a malformed squashfs filesystem.

Affected Systems

All Linux kernel distributions that include the standard squashfs module are affected. The exact version range is not specified, but any kernel with the unpatched squashfs code is potentially vulnerable. Devices or systems that mount or access squashfs images, such as embedded systems or container images, should examine their kernel release for the fix.

Risk and Exploitability

CVSS scoring indicates a moderate severity (6.6). The EPSS score is below 1%, suggesting a low likelihood of exploitation. The vulnerability is not listed in the KEV catalog. Exploitation would likely require an attacker to supply a crafted squashfs image with an invalid index that the kernel processes, making the attack vector local or requiring privileged mounting. Overall, the risk is moderate, but the impact of a kernel crash warrants timely remediation.

Generated by OpenCVE AI on March 26, 2026 at 14:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a version that includes the squashfs offset range check.
  • If an update is not available immediately, unmount or disable the use of squashfs filesystems until a patch can be applied.
  • Regularly review kernel release notes and vendor advisories for updates related to CVE-2026-23388.

Generated by OpenCVE AI on March 26, 2026 at 14:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-788

Thu, 26 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1285
References
Metrics threat_severity

None

cvssV3_1

{'score': 6.6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}

threat_severity

Moderate


Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-788

Wed, 25 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: Squashfs: check metadata block offset is within range Syzkaller reports a "general protection fault in squashfs_copy_data" This is ultimately caused by a corrupted index look-up table, which produces a negative metadata block offset. This is subsequently passed to squashfs_copy_data (via squashfs_read_metadata) where the negative offset causes an out of bounds access. The fix is to check that the offset is within range in squashfs_read_metadata. This will trap this and other cases.
Title Squashfs: check metadata block offset is within range
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-03-25T10:28:06.224Z

Reserved: 2026-01-13T15:37:46.008Z

Link: CVE-2026-23388

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-25T11:16:39.280

Modified: 2026-03-25T15:41:33.977

Link: CVE-2026-23388

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-25T00:00:00Z

Links: CVE-2026-23388 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:47:18Z

Weaknesses