Bug 1769670 (CVE-2017-8284) - CVE-2017-8284 QEMU: privilege escalation via disas_insn function in TCG mode
Summary: CVE-2017-8284 QEMU: privilege escalation via disas_insn function in TCG mode
Alias: CVE-2017-8284
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1769671
Blocks: 1781081
TreeView+ depends on / blocked
Reported: 2019-11-07 07:17 UTC by Dhananjay Arunesh
Modified: 2020-01-07 03:03 UTC (History)
33 users (show)

Fixed In Version: QEMU 2.9.4
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Last Closed: 2019-12-18 08:09:27 UTC

Attachments (Terms of Use)

Description Dhananjay Arunesh 2019-11-07 07:17:42 UTC
The disas_insn function in target/i386/translate.c in QEMU before 2.9.0, when TCG mode without hardware acceleration is used, does not limit the instruction size, which allows local users to gain privileges by creating a modified basic block that injects code into a setuid program, as demonstrated by procmail.


Comment 1 Dhananjay Arunesh 2019-11-07 07:17:55 UTC
Created qemu tracking bugs for this issue:

Affects: epel-7 [bug 1769671]

Comment 2 Daniel Berrangé 2019-12-09 10:50:43 UTC
Note that the QEMU project currently declares that any TCG bugs are NOT considered security issues as TCG emulation implementation is not considered to be of a quality that will provide guest isolation from the host:

  "The non-virtualization use case covers emulation using the Tiny Code Generator
   (TCG).  In principle the TCG and device emulation code used in conjunction with
   the non-virtualization use case should meet the same security requirements as
   the virtualization use case.  However, for historical reasons much of the
   non-virtualization use case code was not written with these security
   requirements in mind.
   Bugs affecting the non-virtualization use case are not considered security
   bugs at this time.  Users with non-virtualization use cases must not rely on
   QEMU to provide guest isolation or any security guarantees."


Comment 5 Nick Tait 2019-12-16 22:11:29 UTC
Thanks for bringing that to Product Security's attention Daniel.

Comment 6 Product Security DevOps Team 2019-12-18 08:09:27 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):


Note You need to log in before you can comment on or make changes to this bug.