πŸ” CVE Alert

CVE-2026-43109

UNKNOWN 0.0

x86: shadow stacks: proper error handling for mmap lock

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: x86: shadow stacks: proper error handling for mmap lock κΉ€μ˜λ―Ό reports that shstk_pop_sigframe() doesn't check for errors from mmap_read_lock_killable(), which is a silly oversight, and also shows that we haven't marked those functions with "__must_check", which would have immediately caught it. So let's fix both issues.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 6, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published β€” delivered to Slack, Telegram or Discord.

Get Free Alerts β†’ Free Β· No credit card Β· 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < c64cebcc5c4f223dbcbe7dcdf74908fc092a0aa4 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 262b6d38a81d51b135db81e1f30c13d30e38feee 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 52f657e34d7b21b47434d9d8b26fa7f6778b63a0
Linux / Linux
All versions affected

References

NVD β†— CVE.org β†— EPSS Data β†—
git.kernel.org: https://git.kernel.org/stable/c/c64cebcc5c4f223dbcbe7dcdf74908fc092a0aa4 git.kernel.org: https://git.kernel.org/stable/c/262b6d38a81d51b135db81e1f30c13d30e38feee git.kernel.org: https://git.kernel.org/stable/c/52f657e34d7b21b47434d9d8b26fa7f6778b63a0