CWE
367
Advisory Published
Updated

CVE-2018-16872

First published: Thu Dec 13 2018(Updated: )

A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the time lstat(2) was called in usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write access to the host filesystem shared with a guest can use this property to navigate the host filesystem in the context of the QEMU process and read any file the QEMU process has access to. Access to the filesystem may be local or via a network share protocol such as CIFS.

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
debian/qemu
1:5.2+dfsg-11+deb11u3
1:5.2+dfsg-11+deb11u2
1:7.2+dfsg-7+deb12u7
1:9.1.2+ds-1
1:9.2.0+ds-2
QEMU<=3.1.0
Debian=8.0
Debian=9.0
Fedora=29
Fedora=30
Ubuntu=14.04
Ubuntu=16.04
Ubuntu=18.04
Ubuntu=18.10
SUSE Linux=42.3

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2018-16872?

    CVE-2018-16872 is classified as a medium severity vulnerability.

  • How do I fix CVE-2018-16872?

    To fix CVE-2018-16872, upgrade to the patched version of QEMU as specified in your distribution's security advisories.

  • Which software is affected by CVE-2018-16872?

    CVE-2018-16872 affects multiple versions of QEMU running on various Linux distributions including Debian and Fedora.

  • What type of vulnerability is CVE-2018-16872?

    CVE-2018-16872 is a flaw related to file handling in the Media Transfer Protocol implementation of QEMU.

  • Can CVE-2018-16872 lead to data loss?

    Yes, CVE-2018-16872 may potentially lead to data loss due to improper file handling.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203