VYPR
Medium severity5.5NVD Advisory· Published May 1, 2026· Updated May 8, 2026

CVE-2026-43045

CVE-2026-43045

Description

In the Linux kernel, the following vulnerability has been resolved:

mshv: Fix error handling in mshv_region_pin

The current error handling has two issues:

First, pin_user_pages_fast() can return a short pin count (less than requested but greater than zero) when it cannot pin all requested pages. This is treated as success, leading to partially pinned regions being used, which causes memory corruption.

Second, when an error occurs mid-loop, already pinned pages from the current batch are not properly accounted for before calling mshv_region_invalidate_pages(), causing a page reference leak.

Treat short pins as errors and fix partial batch accounting before cleanup.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel, improper error handling in mshv_region_pin can lead to memory corruption and page reference leaks.

Vulnerability

In the Linux kernel, the function mshv_region_pin_user_pages_fast() (or its caller mshv_region_pin) contains two error handling flaws. First, pin_user_pages_fast() can return a short pin count — a positive number less than requested — when it cannot pin all pages. The code incorrectly treats this as success, allowing partially pinned regions to be used, which can lead to memory corruption [1]. Second, when an error occurs mid-loop (e.g., an invalid or faulting page in a batch), the already-pinned pages from the current batch are not accounted for before the cleanup function mshv_region_invalidate_pages() is called, causing a page reference leak [2].

Exploitation

An attacker with local access and the ability to interact with the Microsoft Hyper-V (mshv) driver's memory pinning functionality could trigger the bug. No special privileges beyond those needed to invoke the affected ioctl or system call are required. The attack does not require authentication over a network; it is exploitable locally. By providing a mixture of valid and invalid pages in a pin request, the attacker can cause pin_user_pages_fast() to return a short count, leading to the corruption.

Impact

Successful exploitation can result in memory corruption (write to partially pinned memory) and/or a page reference leak, which over time can exhaust system memory. These issues can cause system instability, denial of service, or potentially escalate privileges, depending on the kernel memory layout and other protections.

Mitigation

The fix has been committed to the Linux kernel stable tree as of early May 2026. Administrators should apply the patch (commit references [1][2]) or upgrade their kernel to a version containing versions. No workaround is available; a reboot is required to apply the fix. This vulnerability is not known to be on the CISA KEV list as of the publication date.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

5
  • Linux/Kernel5 versions
    cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 4 more
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=6.15,<6.19.12
    • cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

1