Description
In the Linux kernel, the following vulnerability has been resolved: x86: shadow stacks: proper error handling for mmap lock 김영민 reports that shstk_pop_sigframe() doesn't check for errors from mmap_read_lock_killable(), which is a silly oversight, and also shows that we haven't marked those functions with "__must_check", which would have immediately caught it. So let's fix both issues.
Product status
7fad2a432cd35bbf104d2d9d426e74902f22aa95 (git) before c79cf42321600e931933e11f94aba8b245d4cd66
7fad2a432cd35bbf104d2d9d426e74902f22aa95 (git) before 1a30468eff661937d978495644d2e5ebfeef5ce6
7fad2a432cd35bbf104d2d9d426e74902f22aa95 (git) before c64cebcc5c4f223dbcbe7dcdf74908fc092a0aa4
7fad2a432cd35bbf104d2d9d426e74902f22aa95 (git) before 262b6d38a81d51b135db81e1f30c13d30e38feee
7fad2a432cd35bbf104d2d9d426e74902f22aa95 (git) before 52f657e34d7b21b47434d9d8b26fa7f6778b63a0
6.6
Any version before 6.6
6.6.140 (semver)
6.12.88 (semver)
6.18.24 (semver)
6.19.14 (semver)
7.0 (original_commit_for_fix)
References
git.kernel.org/...c/c79cf42321600e931933e11f94aba8b245d4cd66
git.kernel.org/...c/1a30468eff661937d978495644d2e5ebfeef5ce6
git.kernel.org/...c/c64cebcc5c4f223dbcbe7dcdf74908fc092a0aa4
git.kernel.org/...c/262b6d38a81d51b135db81e1f30c13d30e38feee
git.kernel.org/...c/52f657e34d7b21b47434d9d8b26fa7f6778b63a0