A flaw was found in virtio-win, specifically within the VirtIO Block (BLK) device. When the device undergoes a reset, it fails to properly manage memory, resulting in a use-after-free vulnerability. This issue could allow a local attacker to corrupt system memory, potentially leading to system instability or unexpected behavior.
Metrics
Affected Vendors & Products
References
History
Mon, 30 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in virtio-win, specifically within the VirtIO Block (BLK) device. When the device undergoes a reset, it fails to properly manage memory, resulting in a use-after-free vulnerability. This issue could allow a local attacker to corrupt system memory, potentially leading to system instability or unexpected behavior. | |
| Title | Virtio-win: virtio-win: memory corruption via use-after-free in virtio blk device reset | |
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| Weaknesses | CWE-825 | |
| CPEs | cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-03-30T18:05:38.378Z
Reserved: 2026-03-30T14:51:14.677Z
Link: CVE-2026-5165
Updated: 2026-03-30T18:05:33.941Z
Status : Received
Published: 2026-03-30T15:16:36.520
Modified: 2026-03-30T15:16:36.520
Link: CVE-2026-5165
No data.
OpenCVE Enrichment
No data.