[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248585

 
 

909

 
 

195621

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

CVE-2017-8284 -- qemu

ID: oval:org.secpod.oval:def:2000540Date: (C)2019-06-02   (M)2024-04-17
Class: VULNERABILITYFamily: unix




** DISPUTED ** The disas_insn function in target/i386/translate.c in QEMU before 2.9.0, when TCG mode without hardware acceleration is used, does not limit the instruction size, which allows local users to gain privileges by creating a modified basic block that injects code into a setuid program, as demonstrated by procmail. NOTE: the vendor has stated "this bug does not violate any security guarantees QEMU makes."

Platform:
Debian 8.x
Debian 9.x
Product:
qemu
Reference:
CVE-2017-8284
CVE    1
CVE-2017-8284
CPE    3
cpe:/a:qemu:qemu
cpe:/o:debian:debian_linux:8.x
cpe:/o:debian:debian_linux:9.x

© SecPod Technologies