A flaw was found in virtio-win, specifically within the VirtIO Block (BLK) device. When the device undergoes a reset, it fails to properly manage memory, resulting in a use-after-free vulnerability. This issue could allow a local attacker to corrupt system memory, potentially leading to system instability or unexpected behavior.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2026-5165 | Vendor Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2453015 | Issue Tracking Vendor Advisory |
| https://github.com/virtio-win/kvm-guest-drivers-windows/pull/1493 | Issue Tracking |
Configurations
Configuration 1 (hide)
|
History
28 Apr 2026, 14:17
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Redhat
Redhat virtio-win Redhat enterprise Linux |
|
| CPE | cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:virtio-win:-:*:*:*:*:*:*:* |
|
| References | () https://access.redhat.com/security/cve/CVE-2026-5165 - Vendor Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2453015 - Issue Tracking, Vendor Advisory | |
| References | () https://github.com/virtio-win/kvm-guest-drivers-windows/pull/1493 - Issue Tracking |
01 Apr 2026, 14:24
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
30 Mar 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-30 15:16
Updated : 2026-04-28 14:17
NVD link : CVE-2026-5165
Mitre link : CVE-2026-5165
CVE.ORG link : CVE-2026-5165
JSON object : View
Products Affected
redhat
- enterprise_linux
- virtio-win
CWE
CWE-825
Expired Pointer Dereference
