Description
In the Linux kernel, the following vulnerability has been resolved:

mshv: Fix use-after-free in mshv_map_user_memory error path

In the error path of mshv_map_user_memory(), calling vfree() directly on
the region leaves the MMU notifier registered. When userspace later unmaps
the memory, the notifier fires and accesses the freed region, causing a
use-after-free and potential kernel panic.

Replace vfree() with mshv_partition_put() to properly unregister
the MMU notifier before freeing the region.
Published: 2026-04-03
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Kernel Panic / Denial of Service
Action: Apply Patch
AI Analysis

Impact

The vulnerability is a use‑after‑free in the hypervisor memory mapping routine of the Linux kernel. When an error occurs during user memory mapping, the code frees a memory region without first unregistering the MMU notifier. If user space later unmaps that memory, the notifier handler runs on the freed region, leading to a crash of the kernel. The immediate consequence is a system‑wide denial of service via a kernel panic. "Use‑After‑Free" is a classic memory corruption weakness that can, in some contexts, also allow an attacker to manipulate kernel state, though no direct privilege‑escalation exploit is documented for this defect.

Affected Systems

The affected component is the Linux kernel itself; the vendor is Linux. No specific patch level ranges are disclosed in the advisory, but the patched commit is included in recent kernel releases. All users of the kernel must verify whether the kasan/mshv_map_user_memory path is present and whether the kernel has been updated to the fixed version.

Risk and Exploitability

The CVSS score is not provided, but the failure leads directly to a kernel crash, which is a severe impact. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector would require the attacker to invoke the hypervisor user memory mapping routine, which typically is a privileged operation. Therefore, the exploitability is considered moderate to low in a typical production system without a malicious hypervisor, yet the consequence of a single crash is high. The risk is heightened for environments where a hypervisor is exposed to untrusted code.

Generated by OpenCVE AI on April 3, 2026 at 18:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install a Linux kernel version that includes the patch replacing vfree() with mshv_partition_put() in the mshv_map_user_memory error path

Generated by OpenCVE AI on April 3, 2026 at 18:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 04 Apr 2026 01:15:00 +0000


Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416

Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: mshv: Fix use-after-free in mshv_map_user_memory error path In the error path of mshv_map_user_memory(), calling vfree() directly on the region leaves the MMU notifier registered. When userspace later unmaps the memory, the notifier fires and accesses the freed region, causing a use-after-free and potential kernel panic. Replace vfree() with mshv_partition_put() to properly unregister the MMU notifier before freeing the region.
Title mshv: Fix use-after-free in mshv_map_user_memory error path
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-03T15:15:18.061Z

Reserved: 2026-01-13T15:37:46.016Z

Link: CVE-2026-23432

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-03T16:16:24.637

Modified: 2026-04-03T16:16:24.637

Link: CVE-2026-23432

cve-icon Redhat

Severity :

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-23432 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:16:19Z

Weaknesses