Impact
The vulnerability stems from the mshv_handle_gpa_intercept routine remapping all faults on movable memory regions without first checking whether the requested access is permitted. When a guest attempts to write to a read‑only area or execute a non‑executable region, the remap succeeds but the page remains protected, causing the guest to fault again immediately. This cycle repeats indefinitely, spinning the virtual CPU and consuming host resources. The flaw results in a denial of service where a malicious guest can deliberately trigger the loop to drain CPU time and disrupt other workloads.
Affected Systems
The issue exists in the Linux kernel’s Hyper‑V (mshv) virtual machine monitor component. No specific kernel versions are listed in the CVE data, so all versions of the Linux kernel that contain the affected mshv module are potentially affected until the fix is applied.
Risk and Exploitability
The CVSS score is not provided and EPSS is unavailable, but the vulnerability is already closed in source control. It is not listed in CISA’s KEV catalog, suggesting no publicly known exploits have been observed. The likely attack vector is a malicious guest operating within the virtualized environment, exploiting the improperly validated intercepts to trigger the infinite fault loop. The impact is limited to the host system’s CPU resources, leading to denial of service for other tenants or processes.
OpenCVE Enrichment