CVE-2018-16872 (retired)

A flaw was found in qemu Media Transfer Protocol (MTP). The code opening
files in usb_mtp_get_object and usb_mtp_get_partial_object and directories
in usb_mtp_object_readdir doesn't consider that the underlying filesystem
may have changed since the time lstat(2) was called in
usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write
access to the host filesystem shared with a guest can use this property to
navigate the host filesystem in the context of the QEMU process and read
any file the QEMU process has access to. Access to the filesystem may be
local or via a network share protocol such as CIFS.
Source: qemu (LP Ubuntu Debian)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (code not present)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (code not present)
Ubuntu 18.04 LTS (Bionic Beaver):released (1:2.11+dfsg-1ubuntu7.12)
Ubuntu 18.10 (Cosmic Cuttlefish):released (1:2.12+dfsg-3ubuntu8.6)
Ubuntu 19.04 (Disco Dingo):not-affected (1:3.1+dfsg-2ubuntu1)
Ubuntu 12.04 ESM (Precise Pangolin):not-affected (code not present)
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 18.10 (Cosmic Cuttlefish):DNE
Ubuntu 19.04 (Disco Dingo):DNE
More Information

Updated: 2019-03-27 13:16:42 UTC (commit 1a214fcc001136dae5ddcad2dfe9ae89a806c399)