Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-43489— liveupdate: luo_file: remember retrieve() status

AI Predicted 5.5 Difficulty: Hard EPSS 0.02% · P5

Possible ATT&CK Techniques 1AI

T1564 · Hide Artifacts

Affected Version Matrix 6

VendorProductVersion RangeStatus
LinuxLinux7c722a7f44e0c1f9714084152226bc7bd644b7e3< 1d3ad69484dc1cc53be62d2554e7ef038a627af9affected
7c722a7f44e0c1f9714084152226bc7bd644b7e3< f85b1c6af5bc3872f994df0a5688c1162de07a62affected
6.19affected
< 6.19unaffected
6.19.9≤ 6.19.*unaffected
7.0≤ *unaffected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-43489

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
liveupdate: luo_file: remember retrieve() status
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: liveupdate: luo_file: remember retrieve() status LUO keeps track of successful retrieve attempts on a LUO file. It does so to avoid multiple retrievals of the same file. Multiple retrievals cause problems because once the file is retrieved, the serialized data structures are likely freed and the file is likely in a very different state from what the code expects. The retrieve boolean in struct luo_file keeps track of this, and is passed to the finish callback so it knows what work was already done and what it has left to do. All this works well when retrieve succeeds. When it fails, luo_retrieve_file() returns the error immediately, without ever storing anywhere that a retrieve was attempted or what its error code was. This results in an errored LIVEUPDATE_SESSION_RETRIEVE_FD ioctl to userspace, but nothing prevents it from trying this again. The retry is problematic for much of the same reasons listed above. The file is likely in a very different state than what the retrieve logic normally expects, and it might even have freed some serialization data structures. Attempting to access them or free them again is going to break things. For example, if memfd managed to restore 8 of its 10 folios, but fails on the 9th, a subsequent retrieve attempt will try to call kho_restore_folio() on the first folio again, and that will fail with a warning since it is an invalid operation. Apart from the retry, finish() also breaks. Since on failure the retrieved bool in luo_file is never touched, the finish() call on session close will tell the file handler that retrieve was never attempted, and it will try to access or free the data structures that might not exist, much in the same way as the retry attempt. There is no sane way of attempting the retrieve again. Remember the error retrieve returned and directly return it on a retry. Also pass this status code to finish() so it can make the right decision on the work it needs to do. This is done by changing the bool to an integer. A value of 0 means retrieve was never attempted, a positive value means it succeeded, and a negative value means it failed and the error code is the value.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于luo_retrieve_file函数在检索失败时未记录尝试状态,可能导致重复检索引发问题。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 7c722a7f44e0c1f9714084152226bc7bd644b7e3 ~ 1d3ad69484dc1cc53be62d2554e7ef038a627af9 -
LinuxLinux 6.19 -

II. Public POCs for CVE-2026-43489

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-43489

登录查看更多情报信息。

Same Patch Batch · Linux · 2026-05-13 · 14 CVEs total

CVE-2026-43487ata: libata-core: Disable LPM on ST1000DM010-2EP102
CVE-2026-43488usb: xhci: Prevent interrupt storm on host controller error (HCE)
CVE-2026-43485nouveau/gsp: drop WARN_ON in ACPI probes
CVE-2026-43486arm64: contpte: fix set_access_flags() no-op check for SMMU/ATS faults
CVE-2026-43484mmc: core: Avoid bitfield RMW for claim/retune flags
CVE-2026-43482sched_ext: Disable preemption between scx_claim_exit() and kicking helper work
CVE-2026-43483KVM: SVM: Set/clear CR8 write interception when AVIC is (de)activated
CVE-2026-43480ASoC: amd: acp3x-rt5682-max9836: Add missing error check for clock acquisition
CVE-2026-43481net-shapers: don't free reply skb after genlmsg_reply()
CVE-2026-43479net: usb: lan78xx: fix WARN in __netif_napi_del_locked on disconnect
CVE-2026-43477drm/i915/vrr: Configure VRR timings after enabling TRANS_DDI_FUNC_CTL
CVE-2026-43478ASoC: codecs: rt1011: Use component to get the dapm context in spk_mode_put
CVE-2026-43476iio: chemical: sps30_i2c: fix buffer size in sps30_i2c_read_meas()

IV. Related Vulnerabilities

V. Comments for CVE-2026-43489

No comments yet


Leave a comment