Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-23388

Опубликовано: 25 мар. 2026
Источник: redhat
CVSS3: 6.6
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: Squashfs: check metadata block offset is within range Syzkaller reports a "general protection fault in squashfs_copy_data" This is ultimately caused by a corrupted index look-up table, which produces a negative metadata block offset. This is subsequently passed to squashfs_copy_data (via squashfs_read_metadata) where the negative offset causes an out of bounds access. The fix is to check that the offset is within range in squashfs_read_metadata. This will trap this and other cases.

A flaw was found in the Linux kernel's Squashfs component. A local attacker could craft a malicious Squashfs image with a corrupted index look-up table, leading to a negative metadata block offset. This negative offset causes an out-of-bounds access when processing the image, resulting in a general protection fault and a system crash, effectively causing a Denial of Service (DoS).

Отчет

A kernel crash can occur in Squashfs metadata handling because a corrupted index lookup table can produce a negative metadata block offset. The negative offset is later used by squashfs_read_metadata and can lead to an out of bounds access in squashfs_copy_data which triggers a general protection fault. For the CVSS the PR:L because an attacker typically needs the ability to provide or mount a crafted Squashfs image or otherwise influence the filesystem contents.

Меры по смягчению последствий

To mitigate this issue, prevent module squashfs from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10kernelFix deferred
Red Hat Enterprise Linux 6kernelOut of support scope
Red Hat Enterprise Linux 7kernelFix deferred
Red Hat Enterprise Linux 7kernel-rtFix deferred
Red Hat Enterprise Linux 8kernelFix deferred
Red Hat Enterprise Linux 8kernel-rtFix deferred
Red Hat Enterprise Linux 9kernelFix deferred
Red Hat Enterprise Linux 9kernel-rtFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-1285
https://bugzilla.redhat.com/show_bug.cgi?id=2451212kernel: Squashfs: check metadata block offset is within range

EPSS

Процентиль: 7%
0.00024
Низкий

6.6 Medium

CVSS3

Связанные уязвимости

ubuntu
9 дней назад

In the Linux kernel, the following vulnerability has been resolved: Squashfs: check metadata block offset is within range Syzkaller reports a "general protection fault in squashfs_copy_data" This is ultimately caused by a corrupted index look-up table, which produces a negative metadata block offset. This is subsequently passed to squashfs_copy_data (via squashfs_read_metadata) where the negative offset causes an out of bounds access. The fix is to check that the offset is within range in squashfs_read_metadata. This will trap this and other cases.

nvd
9 дней назад

In the Linux kernel, the following vulnerability has been resolved: Squashfs: check metadata block offset is within range Syzkaller reports a "general protection fault in squashfs_copy_data" This is ultimately caused by a corrupted index look-up table, which produces a negative metadata block offset. This is subsequently passed to squashfs_copy_data (via squashfs_read_metadata) where the negative offset causes an out of bounds access. The fix is to check that the offset is within range in squashfs_read_metadata. This will trap this and other cases.

CVSS3: 6.3
msrc
8 дней назад

Squashfs: check metadata block offset is within range

debian
9 дней назад

In the Linux kernel, the following vulnerability has been resolved: S ...

github
8 дней назад

In the Linux kernel, the following vulnerability has been resolved: Squashfs: check metadata block offset is within range Syzkaller reports a "general protection fault in squashfs_copy_data" This is ultimately caused by a corrupted index look-up table, which produces a negative metadata block offset. This is subsequently passed to squashfs_copy_data (via squashfs_read_metadata) where the negative offset causes an out of bounds access. The fix is to check that the offset is within range in squashfs_read_metadata. This will trap this and other cases.

EPSS

Процентиль: 7%
0.00024
Низкий

6.6 Medium

CVSS3