Description
In the Linux kernel, the following vulnerability has been resolved:

mshv: Fix infinite fault loop on permission-denied GPA intercepts

Prevent infinite fault loops when guests access memory regions without
proper permissions. Currently, mshv_handle_gpa_intercept() attempts to
remap pages for all faults on movable memory regions, regardless of
whether the access type is permitted. When a guest writes to a read-only
region, the remap succeeds but the region remains read-only, causing
immediate re-fault and spinning the vCPU indefinitely.

Validate intercept access type against region permissions before
attempting remaps. Reject writes to non-writable regions and executes to
non-executable regions early, returning false to let the VMM handle the
intercept appropriately.

This also closes a potential DoS vector where malicious guests could
intentionally trigger these fault loops to consume host resources.
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability stems from the mshv_handle_gpa_intercept routine remapping all faults on movable memory regions without first checking whether the requested access is permitted. When a guest attempts to write to a read‑only area or execute a non‑executable region, the remap succeeds but the page remains protected, causing the guest to fault again immediately. This cycle repeats indefinitely, spinning the virtual CPU and consuming host resources. The flaw results in a denial of service where a malicious guest can deliberately trigger the loop to drain CPU time and disrupt other workloads.

Affected Systems

The issue exists in the Linux kernel’s Hyper‑V (mshv) virtual machine monitor component. No specific kernel versions are listed in the CVE data, so all versions of the Linux kernel that contain the affected mshv module are potentially affected until the fix is applied.

Risk and Exploitability

The CVSS score is not provided and EPSS is unavailable, but the vulnerability is already closed in source control. It is not listed in CISA’s KEV catalog, suggesting no publicly known exploits have been observed. The likely attack vector is a malicious guest operating within the virtualized environment, exploiting the improperly validated intercepts to trigger the infinite fault loop. The impact is limited to the host system’s CPU resources, leading to denial of service for other tenants or processes.

Generated by OpenCVE AI on May 6, 2026 at 12:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to the latest stable release that includes the mshv_handle_gpa_intercept patch (commits 02226839 and 16cbec24).
  • Re‑configure guest virtual machines to ensure memory regions are assigned correct permissions, avoiding unnecessary writable or executable flags on read‑only buffers.
  • If the host does not require Hyper‑V functionality, consider disabling the mshv module to eliminate the attack surface.

Generated by OpenCVE AI on May 6, 2026 at 12:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 09:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: mshv: Fix infinite fault loop on permission-denied GPA intercepts Prevent infinite fault loops when guests access memory regions without proper permissions. Currently, mshv_handle_gpa_intercept() attempts to remap pages for all faults on movable memory regions, regardless of whether the access type is permitted. When a guest writes to a read-only region, the remap succeeds but the region remains read-only, causing immediate re-fault and spinning the vCPU indefinitely. Validate intercept access type against region permissions before attempting remaps. Reject writes to non-writable regions and executes to non-executable regions early, returning false to let the VMM handle the intercept appropriately. This also closes a potential DoS vector where malicious guests could intentionally trigger these fault loops to consume host resources.
Title mshv: Fix infinite fault loop on permission-denied GPA intercepts
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T07:40:27.453Z

Reserved: 2026-05-01T14:12:55.984Z

Link: CVE-2026-43096

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-06T10:16:23.027

Modified: 2026-05-06T10:16:23.027

Link: CVE-2026-43096

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T12:30:03Z

Weaknesses

No weakness.