CVE-2026-43389
Memory Corruption in Linux Kernel memfd_luo
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's memory management related to memfd_luo (live update operations). It involves the handling of 'folios', which are memory pages that can be either 'dirty' (written to) or 'clean' (not containing user data). The issue arises because the system saves the dirty state of folios at a certain point (preserve()), but folios can become dirty later. When the folio's state is serialized, it might incorrectly be marked as clean even though it has been dirtied afterward.
As a result, the kernel might treat these folios as clean and reclaim them under memory pressure, leading to loss of user data. The fix is to mark all folios as dirty and always set the MEMFD_LUO_FOLIO_DIRTY flag, preventing clean folios from being reclaimed during live updates.
How can this vulnerability impact me? :
This vulnerability can lead to loss of user data because the kernel might incorrectly reclaim memory pages (folios) that have been written to but are marked as clean. Under memory pressure, these folios could be freed, causing the data they contain to be lost.
For systems using live update features with memfd_luo, this means that important data could be unexpectedly discarded, potentially causing application errors, data corruption, or system instability.
What immediate steps should I take to mitigate this vulnerability?
This vulnerability has been resolved in the Linux kernel by marking all folios of the file as dirty and always setting the MEMFD_LUO_FOLIO_DIRTY flag to prevent clean folios from being reclaimed and losing user data.
To mitigate this vulnerability, you should update your Linux kernel to the version that includes this fix released on or after 2026-05-08.