PT-2026-37419 · Linux · Linux
Published
2026-05-06
·
Updated
2026-05-06
·
CVE-2026-43109
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
x86: shadow stacks: proper error handling for mmap lock
김영민 reports that shstk pop sigframe() doesn't check for errors from
mmap read lock killable(), which is a silly oversight, and also shows
that we haven't marked those functions with " must check", which would
have immediately caught it.
So let's fix both issues.
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux