Home

Description

In the Linux kernel, the following vulnerability has been resolved: x86: shadow stacks: proper error handling for mmap lock 김영민 reports that shstk_pop_sigframe() doesn't check for errors from mmap_read_lock_killable(), which is a silly oversight, and also shows that we haven't marked those functions with "__must_check", which would have immediately caught it. So let's fix both issues.

PUBLISHED Reserved 2026-05-01 | Published 2026-05-06 | Updated 2026-05-17 | Assigner Linux

Product status

Default status
unaffected

7fad2a432cd35bbf104d2d9d426e74902f22aa95 (git) before c79cf42321600e931933e11f94aba8b245d4cd66
affected

7fad2a432cd35bbf104d2d9d426e74902f22aa95 (git) before 1a30468eff661937d978495644d2e5ebfeef5ce6
affected

7fad2a432cd35bbf104d2d9d426e74902f22aa95 (git) before c64cebcc5c4f223dbcbe7dcdf74908fc092a0aa4
affected

7fad2a432cd35bbf104d2d9d426e74902f22aa95 (git) before 262b6d38a81d51b135db81e1f30c13d30e38feee
affected

7fad2a432cd35bbf104d2d9d426e74902f22aa95 (git) before 52f657e34d7b21b47434d9d8b26fa7f6778b63a0
affected

Default status
affected

6.6
affected

Any version before 6.6
unaffected

6.6.140 (semver)
unaffected

6.12.88 (semver)
unaffected

6.18.24 (semver)
unaffected

6.19.14 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/c79cf42321600e931933e11f94aba8b245d4cd66

git.kernel.org/...c/1a30468eff661937d978495644d2e5ebfeef5ce6

git.kernel.org/...c/c64cebcc5c4f223dbcbe7dcdf74908fc092a0aa4

git.kernel.org/...c/262b6d38a81d51b135db81e1f30c13d30e38feee

git.kernel.org/...c/52f657e34d7b21b47434d9d8b26fa7f6778b63a0

cve.org (CVE-2026-43109)

nvd.nist.gov (CVE-2026-43109)

Download JSON