CVE-2026-43109
Awaiting Analysis
Awaiting Analysis - Queue
Linux Kernel Shadow Stack Error Handling Flaw
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
In the Linux kernel, the following vulnerability has been resolved:
x86: shadow stacks: proper error handling for mmap lock
κΉμλ―Ό reports that shstk_pop_sigframe() doesn't check for errors from
mmap_read_lock_killable(), which is a silly oversight, and also shows
that we haven't marked those functions with "__must_check", which would
have immediately caught it.
So let's fix both issues.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is related to the Linux kernel's x86 shadow stacks feature. Specifically, the function shstk_pop_sigframe() did not properly check for errors returned by mmap_read_lock_killable(), which is an oversight in error handling. Additionally, the functions involved were not marked with the '__must_check' attribute, which would have enforced error checking and prevented this issue.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70