PT-2026-39077 · Linux · Linux Kernel
Published
2026-05-08
·
Updated
2026-05-15
·
CVE-2026-43416
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
Name of the Vulnerable Software and Affected Versions
Linux kernel (affected versions not specified)
Description
A flaw exists in the powerpc architecture's perf subsystem where the kernel fails to verify if
current->mm is active before attempting to retrieve the user callchain. This can lead to a kernel NULL pointer dereference and subsequent kernel panic if the memory descriptor (mm) has already been released. This issue was observed when running profiling BPF programs, specifically within the perf callchain user 64() function.Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux Kernel