Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-43166
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-06 May, 2026 | 11:27
Updated At-11 May, 2026 | 22:19
Rejected At-
▼CVE Numbering Authority (CNA)
erofs: fix interlaced plain identification for encoded extents

In the Linux kernel, the following vulnerability has been resolved: erofs: fix interlaced plain identification for encoded extents Only plain data whose start position and on-disk physical length are both aligned to the block size should be classified as interlaced plain extents. Otherwise, it must be treated as shifted plain extents. This issue was found by syzbot using a crafted compressed image containing plain extents with unaligned physical lengths, which can cause OOB read in z_erofs_transform_plain().

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/erofs/zmap.c
Default Status
unaffected
Versions
Affected
  • From 1d191b4ca51d73699cb127386b95ac152af2b930 before 9d5a97bc71ed5783687705c708454c4453aa91d1 (git)
  • From 1d191b4ca51d73699cb127386b95ac152af2b930 before d3790f26d38606f020212486359b84632c19d08b (git)
  • From 1d191b4ca51d73699cb127386b95ac152af2b930 before 4a2d046e4b13202a6301a993961f5b30ae4d7119 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/erofs/zmap.c
Default Status
affected
Versions
Affected
  • 6.15
Unaffected
  • From 0 before 6.15 (semver)
  • From 6.18.16 through 6.18.* (semver)
  • From 6.19.6 through 6.19.* (semver)
  • From 7.0 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
3.17.1HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
Version: 3.1
Base score: 7.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/9d5a97bc71ed5783687705c708454c4453aa91d1
N/A
https://git.kernel.org/stable/c/d3790f26d38606f020212486359b84632c19d08b
N/A
https://git.kernel.org/stable/c/4a2d046e4b13202a6301a993961f5b30ae4d7119
N/A
Hyperlink: https://git.kernel.org/stable/c/9d5a97bc71ed5783687705c708454c4453aa91d1
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d3790f26d38606f020212486359b84632c19d08b
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/4a2d046e4b13202a6301a993961f5b30ae4d7119
Resource: N/A
Details not found