A heap out of bounds memory read was found in the virtual nvme device in QEMU. An offset provided by guest is not validated by qemu process before computing a host heap pointer, which is used for copying data back to guest. Arbitrary heap memory relative to an allocated buffer can be disclosed. ZDI security advisory: https://www.zerodayinitiative.com/advisories/ZDI-CAN-21521 Upstream patch: https://lists.nongnu.org/archive/html/qemu-devel/2023-08/msg00516.html
Created qemu tracking bugs for this issue: Affects: fedora-all [bug 2229104]
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2023-4135
Upstream commit: https://gitlab.com/qemu-project/qemu/-/commit/ecb1b7b082d3b7dceff0e486a114502fc52c0fdf