Published
Permalink
CVE-2026-5165
6.7 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): HIGH
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
by @mweinelt Activity log
- Created automatic suggestion
- @mweinelt accepted
- @mweinelt published on GitHub
Virtio-win: virtio-win: memory corruption via use-after-free in virtio blk device reset
A flaw was found in virtio-win, specifically within the VirtIO Block (BLK) device. When the device undergoes a reset, it fails to properly manage memory, resulting in a use-after-free vulnerability. This issue could allow a local attacker to corrupt system memory, potentially leading to system instability or unexpected behavior.
References
- https://access.redhat.com/security/cve/CVE-2026-5165 x_refsource_REDHAT vdb-entry
- RHBZ#2453015 issue-tracking x_refsource_REDHAT
- https://github.com/virtio-win/kvm-guest-drivers-windows/pull/1493
Affected products
virtio-win
Package maintainers
-
@anthonyroussel Anthony Roussel <anthony@roussel.dev>