Out-of-bounds Read Affecting qemu-project/qemu package, versions [0,]


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.38% (73rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-QEMUPROJECTQEMU-5820003
  • published4 Aug 2023
  • disclosed3 Aug 2023
  • creditTrend Micro Zero Day

Introduced: 3 Aug 2023

CVE-2023-4135  (opens in a new tab)
CWE-125  (opens in a new tab)

How to fix?

There is no fixed version for qemu-project/qemu.

Overview

Affected versions of this package are vulnerable to Out-of-bounds Read. The QEMU process does not validate an offset provided by the guest before computing a host heap pointer, which is used for copying data back to the guest. Arbitrary heap memory relative to an allocated buffer can be disclosed.

Note:

The qemu-kvm packages as shipped with Red Hat Enterprise Linux are not affected by this flaw as they do not include support for NVMe emulation.

CVSS Scores

version 3.1