CVE-2026-43109
Awaiting Analysis Awaiting Analysis - Queue
Linux Kernel Shadow Stack Error Handling Flaw

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: x86: shadow stacks: proper error handling for mmap lock κΉ€μ˜λ―Ό reports that shstk_pop_sigframe() doesn't check for errors from mmap_read_lock_killable(), which is a silly oversight, and also shows that we haven't marked those functions with "__must_check", which would have immediately caught it. So let's fix both issues.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is related to the Linux kernel's x86 shadow stacks feature. Specifically, the function shstk_pop_sigframe() did not properly check for errors returned by mmap_read_lock_killable(), which is an oversight in error handling. Additionally, the functions involved were not marked with the '__must_check' attribute, which would have enforced error checking and prevented this issue.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart