Description
In the Linux kernel, the following vulnerability has been resolved: x86: shadow stacks: proper error handling for mmap lock 김영민 reports that shstk_pop_sigframe() doesn't check for errors from mmap_read_lock_killable(), which is a silly oversight, and also shows that we haven't marked those functions with "__must_check", which would have immediately caught it. So let's fix both issues.
Product status
7fad2a432cd35bbf104d2d9d426e74902f22aa95 (git) before c64cebcc5c4f223dbcbe7dcdf74908fc092a0aa4
7fad2a432cd35bbf104d2d9d426e74902f22aa95 (git) before 262b6d38a81d51b135db81e1f30c13d30e38feee
7fad2a432cd35bbf104d2d9d426e74902f22aa95 (git) before 52f657e34d7b21b47434d9d8b26fa7f6778b63a0
6.6
Any version before 6.6
6.18.24 (semver)
6.19.14 (semver)
7.0 (original_commit_for_fix)
References
git.kernel.org/...c/c64cebcc5c4f223dbcbe7dcdf74908fc092a0aa4
git.kernel.org/...c/262b6d38a81d51b135db81e1f30c13d30e38feee
git.kernel.org/...c/52f657e34d7b21b47434d9d8b26fa7f6778b63a0