CVE-2025-68743
Description
In the Linux kernel, the following vulnerability has been resolved:
mshv: Fix create memory region overlap check
The current check is incorrect; it only checks if the beginning or end of a region is within an existing region. This doesn't account for userspace specifying a region that begins before and ends after an existing region.
Change the logic to a range intersection check against gfns and uaddrs for each region.
Remove mshv_partition_region_by_uaddr() as it is no longer used.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's mshv driver, a flawed memory region overlap check allowed a region to fully contain an existing one, potentially leading to memory corruption.
Vulnerability
Overview The vulnerability resides in the Microsoft Hyper-V (mshv) driver within the Linux kernel. The function responsible for checking whether a new memory region overlaps with existing regions only verified if the start or end address of the new region fell inside an existing region. This logic failed to detect cases where a user-supplied region completely enveloped an existing region, as neither endpoint would lie within the existing region's boundaries [1].
Exploitation
Prerequisites An attacker would need the ability to create memory regions via the mshv interface, which typically requires elevated privileges (e.g., root or CAP_SYS_ADMIN). By crafting a region that starts before and ends after an existing region, the flawed check would pass, allowing the creation of overlapping memory mappings. No authentication is required beyond the necessary system access.
Impact
Successful exploitation could result in overlapping memory regions within the hypervisor partition. This may lead to memory corruption, information disclosure, or other undefined behavior, potentially compromising the integrity of the virtual machine or the host system. The exact impact depends on how the overlapping regions are used by subsequent operations.
Mitigation
The fix, introduced in Linux kernel stable commit ab3e7a78d83a, replaces the endpoint-based check with a proper range intersection test for both guest physical frame numbers (gfns) and user addresses (uaddrs). The unused helper function mshv_partition_region_by_uaddr() is also removed. Users should apply the latest kernel updates to address this vulnerability [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.