Impact
A buffer overrun flaw exists in the virtio-win driver’s RhelDoUnMap() function, where the number of descriptors supplied by a user during an unmap request is not validated. This oversight allows a local user to provide an excessive count, causing the driver to write beyond its bounds and crash the operating system. The primary consequence is a system crash, resulting in a denial of service.
Affected Systems
Red Hat Enterprise Linux 8, 9, and 10 systems that include the virtio-win driver for KVM virtual machines are affected. The vulnerability is present in the virtual device driver used to provide Windows guest drivers on Red Hat hosts.
Risk and Exploitability
The CVSS score of 6.7 indicates medium severity, but the flaw is only exploitable by a local or privileged user within the guest environment. The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog, suggesting that widespread exploitation is not yet documented. Attackers would need to run code inside the guest that communicates with the virtio‑win driver, and can trigger the crash by requesting an unmap operation with an oversized descriptor count.
OpenCVE Enrichment