CVE-2026-43109
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
06/05/2026
Last modified:
17/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
x86: shadow stacks: proper error handling for mmap lock<br />
<br />
김영민 reports that shstk_pop_sigframe() doesn&#39;t check for errors from<br />
mmap_read_lock_killable(), which is a silly oversight, and also shows<br />
that we haven&#39;t marked those functions with "__must_check", which would<br />
have immediately caught it.<br />
<br />
So let&#39;s fix both issues.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6 (including) | 6.18.24 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.14 (excluding) |
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1a30468eff661937d978495644d2e5ebfeef5ce6
- https://git.kernel.org/stable/c/262b6d38a81d51b135db81e1f30c13d30e38feee
- https://git.kernel.org/stable/c/52f657e34d7b21b47434d9d8b26fa7f6778b63a0
- https://git.kernel.org/stable/c/c64cebcc5c4f223dbcbe7dcdf74908fc092a0aa4
- https://git.kernel.org/stable/c/c79cf42321600e931933e11f94aba8b245d4cd66



