A flaw was found in virtio-win, specifically within the VirtIO Block (BLK) device. When the device undergoes a reset, it fails to properly manage memory, resulting in a use-after-free vulnerability. This issue could allow a local attacker to corrupt system memory, potentially leading to system instability or unexpected behavior.
| Vendor | Product | Versions |
|---|---|---|
| red hat | red hat enterprise linux | — |
Updated description with critical vulnerability details, changed product to kvm-guest-drivers-windows, and updated severity to CRITICAL.
Initial creation