CVE-2026-43489: Liveupdate File Handling in Linux Kernel

平台

linux

组件

linux

修复版本

f85b1c6af5bc3872f994df0a5688c1162de07a62

正在翻译为您的语言…

CVE-2026-43489 is a vulnerability affecting the Linux Kernel's liveupdate functionality. This flaw stems from an issue in how the kernel manages the retrieval status of liveupdate files, potentially leading to incorrect data processing and system instability. The vulnerability impacts Linux Kernel versions up to and including f85b1c6af5bc3872f994df0a5688c1162de07a62. A fix is available in kernel version f85b1c6af5bc3872f994df0a5688c1162de07a62.

影响与攻击场景翻译中…

The vulnerability lies in the luo_file structure within the liveupdate subsystem. Specifically, the retrieve boolean, which tracks whether a file has been successfully retrieved, is not consistently managed. Multiple retrievals of the same file can occur, leading to the serialized data structures being freed while the code still attempts to process them. This can result in the kernel attempting to operate on invalid or corrupted data, potentially leading to a crash, unexpected behavior, or even privilege escalation depending on the liveupdate functionality being exploited. While direct remote exploitation is unlikely, a malicious actor with local access or control over the liveupdate mechanism could trigger this condition.

利用背景翻译中…

CVE-2026-43489 is currently not listed on KEV (Kernel Exploitability Vulnerability). The EPSS (Exploit Prediction Scoring System) score is pending evaluation. No public proof-of-concept (POC) code has been released as of the publication date. Given the nature of the vulnerability – requiring control over the liveupdate mechanism – the probability of active exploitation is considered low to medium, primarily targeting systems with custom liveupdate configurations or those with local attacker access.

受影响的软件

组件linux
供应商Linux
最高版本f85b1c6af5bc3872f994df0a5688c1162de07a62
修复版本f85b1c6af5bc3872f994df0a5688c1162de07a62

时间线

  1. 已保留
  2. 发布日期

缓解措施和替代方案翻译中…

The primary mitigation for CVE-2026-43489 is to upgrade the Linux Kernel to version f85b1c6af5bc3872f994df0a5688c1162de07a62 or later. If an immediate upgrade is not feasible, consider temporarily disabling the liveupdate functionality if it's not critical for your system. Review any custom liveupdate scripts or configurations to ensure they are not inadvertently triggering multiple retrievals of the same file. Monitor system logs for any unusual errors related to liveupdate or file handling, which could indicate exploitation attempts. After upgrading, confirm the fix by verifying the kernel version using uname -r and ensuring it is greater than or equal to f85b1c6af5bc3872f994df0a5688c1162de07a62.

修复方法翻译中…

Actualizar el kernel de Linux a la versión 6.19.1 o superior para mitigar el problema. La vulnerabilidad se corrige al recordar el estado de la operación de recuperación de archivos, evitando intentos de recuperación repetidos y posibles errores en el manejo de datos.

常见问题翻译中…

What is CVE-2026-43489 — Liveupdate File Handling in Linux Kernel?

CVE-2026-43489 is a vulnerability in the Linux Kernel's liveupdate functionality where incorrect file retrieval status tracking can lead to data corruption and potential system instability.

Am I affected by CVE-2026-43489 in Linux Kernel?

You are affected if your Linux Kernel version is prior to f85b1c6af5bc3872f994df0a5688c1162de07a62. Check your kernel version with uname -r.

How do I fix CVE-2026-43489 in Linux Kernel?

Upgrade your Linux Kernel to version f85b1c6af5bc3872f994df0a5688c1162de07a62 or later. If immediate upgrade is not possible, consider disabling liveupdate functionality.

Is CVE-2026-43489 being actively exploited?

Currently, there are no public exploits or reports of active exploitation. However, systems with custom liveupdate configurations are at higher risk.

Where can I find the official Linux advisory for CVE-2026-43489?

Refer to the Linux Kernel security announcements and your distribution's security advisories for the latest information and updates related to CVE-2026-43489.

你的项目受影响吗?

上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。

live免费扫描

立即试用 — 无需账户

上传任意清单文件(composer.lock、package-lock.json、WordPress插件列表等)或粘贴组件列表,即可立即获得漏洞报告。上传文件只是开始:注册账号后,您将获得持续监控、Slack/邮件提醒、多项目管理和白标报告等功能。

手动扫描Slack/邮件提醒持续监控白标报告

拖放您的依赖文件

composer.lock、package-lock.json、requirements.txt、Gemfile.lock、pubspec.lock、Dockerfile...