The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-43348

CVE-2026-43348: Linux Kernel Memory Mapping Vulnerability

CVE-2026-43348 is a memory mapping flaw in the Linux kernel mshv_vtl module that causes vmemmap_shift to exceed MAX_FOLIO_ORDER limits. This article covers the technical details, affected versions, and mitigation strategies.

Published: May 18, 2026

CVE-2026-43348 Overview

CVE-2026-43348 is a Linux kernel vulnerability in the mshv_vtl driver, which handles Microsoft Hypervisor Virtual Trust Level (VTL) memory registration. The flaw resides in the MSHV_ADD_VTL0_MEMORY ioctl path, where the kernel computes pgmap->vmemmap_shift without clamping the result to MAX_FOLIO_ORDER. A sufficiently aligned physical memory range causes memremap_pages() to reject the request, triggering a kernel WARN and returning -EINVAL. The issue affects local users with privileges to invoke the relevant ioctl on hypervisor-enabled systems.

Critical Impact

A local privileged user can trigger a kernel warning and prevent VTL0 memory registration, resulting in denial of service for hypervisor-backed workloads.

Affected Products

  • Linux Kernel (upstream mshv_vtl driver)
  • Distributions shipping kernels with the Microsoft Hypervisor VTL subsystem enabled
  • Systems supporting MSHV_ADD_VTL0_MEMORY ioctl

Discovery Timeline

  • 2026-05-08 - CVE-2026-43348 published to NVD
  • 2026-05-15 - Last updated in NVD database

Technical Details for CVE-2026-43348

Vulnerability Analysis

The mshv_vtl driver registers VTL0 memory ranges on behalf of user space through the MSHV_ADD_VTL0_MEMORY interface. During registration, the kernel computes pgmap->vmemmap_shift as the number of trailing zeros in the bitwise OR of start_pfn and last_pfn. The intent is to select the largest compound page order to which both endpoints are aligned.

The computed shift is never bounded by MAX_FOLIO_ORDER. When a caller registers a heavily aligned range such as [0x800000000000, 0x800080000000), the computation yields 35 trailing zeros from start_pfn=0x800000000. That shift exceeds the maximum folio order accepted by memremap_pages(), producing the kernel warning requested folio size unsupported and an -EINVAL return.

A secondary defect compounds the impact. The error path hard-codes -EFAULT instead of propagating the actual return value from devm_memremap_pages(), masking the underlying -EINVAL condition and complicating diagnosis.

Root Cause

The root cause is missing input bounds enforcement on a computed page order. The folio order check enforced by commit 646b67d57589 ("mm/memremap: reject unreasonable folio/compound page sizes in memremap_pages()") rejects any shift exceeding MAX_FOLIO_ORDER, but mshv_vtl does not clamp its computed value before calling into the memory remap path.

Attack Vector

Exploitation requires local access and the privileges needed to invoke MSHV_ADD_VTL0_MEMORY on a system exposing the mshv_vtl interface. A local actor submits an aligned PFN range that produces a vmemmap_shift greater than MAX_FOLIO_ORDER. The kernel emits a warning and refuses the registration, disrupting VTL0 memory provisioning and any dependent virtualization workflows.

The upstream fix clamps vmemmap_shift to MAX_FOLIO_ORDER and propagates the real error code from devm_memremap_pages(). See the commits at Kernel Git Commit 404cd6b and Kernel Git Commit a142ca4b for the patch details.

Detection Methods for CVE-2026-43348

Indicators of Compromise

  • Kernel log entries containing the string requested folio size unsupported originating from memremap_pages.
  • WARNING traces referencing memremap_pages+0x512/0x650 in dmesg output.
  • Failed MSHV_ADD_VTL0_MEMORY ioctl calls returning -EFAULT or -EINVAL on hypervisor hosts.

Detection Strategies

  • Monitor kernel ring buffer and syslog for memremap_pages warnings tied to the mshv_vtl subsystem.
  • Audit processes invoking ioctl against /dev/mshv* device nodes and correlate with subsequent kernel warnings.
  • Track running kernel build versions against the stable trees that include the fix commits.

Monitoring Recommendations

  • Forward dmesg and journald kernel facility events to a centralized logging pipeline for alerting on WARN traces.
  • Establish baselines for legitimate VTL0 memory registration patterns and alert on unexpected callers or alignment anomalies.
  • Inventory hosts where the mshv_vtl module is loaded and prioritize them for patch rollout tracking.

How to Mitigate CVE-2026-43348

Immediate Actions Required

  • Apply the upstream Linux kernel patches that clamp vmemmap_shift to MAX_FOLIO_ORDER in the mshv_vtl driver.
  • Restrict access to mshv_vtl device nodes to trusted administrative accounts and service identities.
  • Audit which workloads invoke MSHV_ADD_VTL0_MEMORY and validate the PFN ranges they submit.

Patch Information

The fix is available in the stable Linux kernel trees via commits 404cd6b and a142ca4b. The patches clamp the computed vmemmap_shift to MAX_FOLIO_ORDER and propagate the actual return code from devm_memremap_pages() rather than masking it with -EFAULT.

Workarounds

  • Limit the file mode and ownership on mshv_vtl device nodes so only required service accounts can issue the ioctl.
  • Avoid registering VTL0 memory ranges whose start_pfn and last_pfn share trailing zero counts greater than MAX_FOLIO_ORDER.
  • Where feasible, unload the mshv_vtl module on hosts that do not require Microsoft Hypervisor VTL functionality until patches are deployed.
bash
# Configuration example: restrict access and inventory affected hosts
ls -l /dev/mshv* 2>/dev/null
chmod 0600 /dev/mshv_vtl 2>/dev/null
lsmod | grep -i mshv
dmesg | grep -E 'memremap_pages|requested folio size unsupported'

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeOther

  • Vendor/TechLinux Kernel

  • SeverityMEDIUM

  • CVSS Score5.5

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • NVD-CWE-noinfo
  • Vendor Resources
  • Kernel Git Commit 404cd6b

  • Kernel Git Commit a142ca4b
  • Related CVEs
  • CVE-2026-43343: Linux Kernel USB Gadget Vulnerability

  • CVE-2026-43307: Linux Kernel FIFO Read Overflow Vulnerability

  • CVE-2026-43352: Linux Kernel DMA Ring Abort Vulnerability

  • CVE-2026-43308: Linux Kernel BUG Error Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the Most Advanced Cybersecurity Platform

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English