In the Linux kernel, the following vulnerability has been resolved:
KVM: guest_memfd: Remove bindings on memslot deletion when gmem is dying
When unbinding a memslot from a guestmemfd instance, remove the bindings even if the guestmemfd file is dying, i.e. even if its file refcount has gone to zero. If the memslot is freed before the file is fully released, nullifying the memslot side of the binding in kvmgmemrelease() will write to freed memory, as detected by syzbot+KASAN:
================================================================== BUG: KASAN: slab-use-after-free in kvmgmemrelease+0x176/0x440 virt/kvm/guest_memfd.c:353 Write of size 8 at addr ffff88807befa508 by task syz.0.17/6022
CPU: 0 UID: 0 PID: 6022 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 Call Trace: <TASK> dumpstacklvl+0x189/0x250 lib/dumpstack.c:120 printaddressdescription mm/kasan/report.c:378 [inline] printreport+0xca/0x240 mm/kasan/report.c:482 kasanreport+0x118/0x150 mm/kasan/report.c:595 kvmgmemrelease+0x176/0x440 virt/kvm/guestmemfd.c:353 _fput+0x44c/0xa70 fs/filetable.c:468 taskworkrun+0x1d4/0x260 kernel/taskwork.c:227 resumeusermodework include/linux/resumeusermode.h:50 [inline] exittousermodeloop+0xe9/0x130 kernel/entry/common.c:43 exittousermodeprepare include/linux/irq-entry-common.h:225 [inline] syscallexittousermodework include/linux/entry-common.h:175 [inline] syscallexittousermode include/linux/entry-common.h:210 [inline] dosyscall64+0x2bd/0xfa0 arch/x86/entry/syscall64.c:100 entrySYSCALL64afterhwframe+0x77/0x7f RIP: 0033:0x7fbeeff8efc9 </TASK>
Allocated by task 6023: kasansavestack mm/kasan/common.c:56 [inline] kasansavetrack+0x3e/0x80 mm/kasan/common.c:77 poisonkmallocredzone mm/kasan/common.c:397 [inline] _kasankmalloc+0x93/0xb0 mm/kasan/common.c:414 kasankmalloc include/linux/kasan.h:262 [inline] _kmalloccachenoprof+0x3e2/0x700 mm/slub.c:5758 kmallocnoprof include/linux/slab.h:957 [inline] kzallocnoprof include/linux/slab.h:1094 [inline] kvmsetmemoryregion+0x747/0xb90 virt/kvm/kvmmain.c:2104 kvmvmioctlsetmemoryregion+0x6f/0xd0 virt/kvm/kvmmain.c:2154 kvmvmioctl+0x957/0xc60 virt/kvm/kvmmain.c:5201 vfsioctl fs/ioctl.c:51 [inline] _dosysioctl fs/ioctl.c:597 [inline] _sesysioctl+0xfc/0x170 fs/ioctl.c:583 dosyscallx64 arch/x86/entry/syscall64.c:63 [inline] dosyscall64+0xfa/0xfa0 arch/x86/entry/syscall64.c:94 entrySYSCALL64afterhwframe+0x77/0x7f
Freed by task 6023: kasansavestack mm/kasan/common.c:56 [inline] kasansavetrack+0x3e/0x80 mm/kasan/common.c:77 kasansavefreeinfo+0x46/0x50 mm/kasan/generic.c:584 poisonslabobject mm/kasan/common.c:252 [inline] _kasanslabfree+0x5c/0x80 mm/kasan/common.c:284 kasanslabfree include/linux/kasan.h:234 [inline] slabfreehook mm/slub.c:2533 [inline] slabfree mm/slub.c:6622 [inline] kfree+0x19a/0x6d0 mm/slub.c:6829 kvmsetmemoryregion+0x9c4/0xb90 virt/kvm/kvmmain.c:2130 kvmvmioctlsetmemoryregion+0x6f/0xd0 virt/kvm/kvmmain.c:2154 kvmvmioctl+0x957/0xc60 virt/kvm/kvmmain.c:5201 vfsioctl fs/ioctl.c:51 [inline] _dosysioctl fs/ioctl.c:597 [inline] _sesysioctl+0xfc/0x170 fs/ioctl.c:583 dosyscallx64 arch/x86/entry/syscall64.c:63 [inline] dosyscall64+0xfa/0xfa0 arch/x86/entry/syscall64.c:94 entrySYSCALL64after_hwframe+0x77/0x7f
Deliberately don't acquire filemap invalid lock when the file is dying as the lifecycle of fmapping is outside the purview of KVM. Dereferencing the mapping is *probably* fine, but there's no need to invalidate anything as memslot deletion is responsible for zapping SPTEs, and the only code that can access the dying file is kvmgmem_release(), whose core code is mutual ---truncated---
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40274.json"
}