CVE-2026-43361
Transaction Abort in BTRFS Filesystem
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.19.0-rc8 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's Btrfs filesystem. It allows a user to trigger a transaction abort by repeatedly snapshotting a previously received snapshot until a specific internal item (BTRFS_UUID_KEY_RECEIVED_SUBVOL) overflows. This overflow causes the filesystem to switch to read-only (RO) mode.
The snapshot, send, and receive operations involved do not require full administrative privileges (CAP_SYS_ADMIN), only inode ownership or capability. Therefore, a malicious user with limited permissions can exploit this to disrupt the system by making the filesystem read-only.
How can this vulnerability impact me? :
The primary impact of this vulnerability is that an attacker can cause the affected Btrfs filesystem to become read-only by triggering a transaction abort. This effectively disrupts normal filesystem operations, preventing writes and potentially causing system instability or denial of service.
Since the exploit does not require full administrative privileges, it increases the risk that a non-privileged user could disrupt system functionality.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for errors related to BTRFS transaction aborts and read-only filesystem states when snapshotting received subvolumes multiple times.
You can use the following commands to reproduce or detect the issue on a system using BTRFS:
- Check dmesg or syslog for BTRFS warnings and transaction abort messages, e.g., run `dmesg | grep BTRFS`.
- Attempt to create multiple snapshots of a received subvolume using a script similar to the provided reproducer script, which repeatedly snapshots a received subvolume until the filesystem turns read-only.
- Observe errors such as "Value too large for defined data type" or "Read-only file system" during snapshot creation attempts.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include preventing unprivileged users from repeatedly snapshotting received subvolumes to avoid triggering the BTRFS_UUID_KEY_RECEIVED_SUBVOL item overflow.
Since the snapshot, send, and receive operations do not require CAP_SYS_ADMIN but only inode_owner_or_capable(), restricting user permissions on BTRFS subvolumes and monitoring usage can help mitigate exploitation.
Additionally, applying the patch or update that fixes this vulnerability in the Linux kernel is the definitive mitigation.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not include any details about how this vulnerability affects compliance with common standards and regulations such as GDPR or HIPAA.