Impact
A use‑after‑free vulnerability exists in the VirtIO Block (BLK) device of virtio‑win. When the device is reset, memory is corrupted, which a local attacker could exploit to break system stability or produce unexpected behavior. This flaw falls under CWE‑825: Incorrect Memory Management.
Affected Systems
The vulnerability affects Red Hat Enterprise Linux 8, 9 and 10, where the virtio‑win package hosts the VirtIO Block driver used by virtual machines.
Risk and Exploitability
The flaw carries a CVSS score of 6.7, indicating moderate severity, and has no reported exploits or inclusion in CISA’s KEV catalog. Because the attack surface is local and requires initiating a device reset, the risk is limited to environments that expose virtio‑blk devices; however, the lack of an official patch or workaround emphasizes the need for monitoring until remediation is available.
OpenCVE Enrichment