Home

Description

In the Linux kernel, the following vulnerability has been resolved: x86: shadow stacks: proper error handling for mmap lock 김영민 reports that shstk_pop_sigframe() doesn't check for errors from mmap_read_lock_killable(), which is a silly oversight, and also shows that we haven't marked those functions with "__must_check", which would have immediately caught it. So let's fix both issues.

PUBLISHED Reserved 2026-05-01 | Published 2026-05-06 | Updated 2026-05-07 | Assigner Linux

Product status

Default status
unaffected

7fad2a432cd35bbf104d2d9d426e74902f22aa95 (git) before c64cebcc5c4f223dbcbe7dcdf74908fc092a0aa4
affected

7fad2a432cd35bbf104d2d9d426e74902f22aa95 (git) before 262b6d38a81d51b135db81e1f30c13d30e38feee
affected

7fad2a432cd35bbf104d2d9d426e74902f22aa95 (git) before 52f657e34d7b21b47434d9d8b26fa7f6778b63a0
affected

Default status
affected

6.6
affected

Any version before 6.6
unaffected

6.18.24 (semver)
unaffected

6.19.14 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/c64cebcc5c4f223dbcbe7dcdf74908fc092a0aa4

git.kernel.org/...c/262b6d38a81d51b135db81e1f30c13d30e38feee

git.kernel.org/...c/52f657e34d7b21b47434d9d8b26fa7f6778b63a0

cve.org (CVE-2026-43109)

nvd.nist.gov (CVE-2026-43109)

Download JSON