CVE-2018-16872 (retired)

Priority
Description
A flaw was found in qemu Media Transfer Protocol (MTP). The code opening
files in usb_mtp_get_object and usb_mtp_get_partial_object and directories
in usb_mtp_object_readdir doesn't consider that the underlying filesystem
may have changed since the time lstat(2) was called in
usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write
access to the host filesystem shared with a guest can use this property to
navigate the host filesystem in the context of the QEMU process and read
any file the QEMU process has access to. Access to the filesystem may be
local or via a network share protocol such as CIFS.
Package
Source: qemu (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (code not present)
Ubuntu 18.04 LTS (Bionic Beaver):released (1:2.11+dfsg-1ubuntu7.12)
Ubuntu 19.04 (Disco Dingo):not-affected (1:3.1+dfsg-2ubuntu1)
Patches:
Upstream:https://git.qemu.org/?p=qemu.git;a=commit;h=bab9df35ce73d1c8e19a37e2737717ea1c984dc1
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):not-affected (code not present)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 19.04 (Disco Dingo):DNE
More Information

Updated: 2019-08-23 09:31:17 UTC (commit 436fd4ed4cf0038ddd382cb8649607ace163dda7)