CVE-2026-43118
Btrfs Inode Size Corruption After Log Replay
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's btrfs filesystem related to how inode sizes are logged and replayed after a crash or power failure.
When the filesystem logs that an inode exists (for example, when logging new directory entries or hardlinks), it sets the inode generation to 0 to indicate that the inode size (i_size) should not be updated during log replay.
However, if an inode was previously logged with a non-zero size and then later logged as existing with a generation of 0 and size 0 (such as after truncating a file and creating a hard link), the log replay process incorrectly skips updating the inode size.
As a result, after a crash and log replay, the file size may remain at its old value instead of being updated to zero, causing inconsistency between the actual file content and its recorded size.
The fix ensures that the real inode generation is logged properly and the correct inode size is preserved during log replay.
How can this vulnerability impact me? :
This vulnerability can cause files to have incorrect sizes after a system crash or power failure.
Specifically, a file that was truncated to zero size might still appear to have its old size after log replay, leading to potential data inconsistency.
This can impact applications or users relying on accurate file size information, potentially causing errors in file processing, backup, or synchronization operations.