CVE-2026-43472
Linux Kernel Unshare Filesystem Handling Vulnerability
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's unshare(2) system call, specifically in the handling of the unshare_fs() function. When certain flags like CLONE_NEWNS and CLONE_NEWCGROUP are used together, and the current process's filesystem structure (fs) hasn't been shared, the kernel incorrectly passes the original fs structure instead of a private copy to copy_mnt_ns().
If copy_mnt_ns() succeeds but a subsequent call to copy_cgroup_ns() fails (for example, due to memory exhaustion), the kernel destroys the newly created mount namespace but leaves the process's current fs pointers (root and pwd) pointing to now detached mounts. This results in the unshare(2) call failing with an error (-ENOMEM) while leaving the process in an inconsistent state with references to invalid mount points.
The fix involves always allocating a new fs_struct when CLONE_NEWNS is used, even if the fs_struct wasn't previously shared, preventing the process from ending up with dangling pointers after failure.
How can this vulnerability impact me? :
This vulnerability can cause the unshare(2) system call to fail with an error while leaving the calling process in an inconsistent state where its current working directory (pwd) and root directory pointers reference detached and invalid mount points.
Although this does not lead to use-after-free (UAF) conditions, it can cause unexpected behavior or instability in processes relying on unshare(2), potentially leading to application errors or system misbehavior.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is related to the Linux kernel's unshare(2) system call handling, specifically with CLONE_NEWNS and CLONE_NEWCGROUP flags causing issues with mount namespaces and fs_struct allocation.
To mitigate this vulnerability, update your Linux kernel to a version where this issue has been fixed. The fix involves ensuring that a new fs_struct is allocated when CLONE_NEWNS is used, preventing the bug from occurring.