Количество 17
Количество 17

CVE-2018-16872
A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the time lstat(2) was called in usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write access to the host filesystem shared with a guest can use this property to navigate the host filesystem in the context of the QEMU process and read any file the QEMU process has access to. Access to the filesystem may be local or via a network share protocol such as CIFS.

CVE-2018-16872
A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the time lstat(2) was called in usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write access to the host filesystem shared with a guest can use this property to navigate the host filesystem in the context of the QEMU process and read any file the QEMU process has access to. Access to the filesystem may be local or via a network share protocol such as CIFS.

CVE-2018-16872
A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the time lstat(2) was called in usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write access to the host filesystem shared with a guest can use this property to navigate the host filesystem in the context of the QEMU process and read any file the QEMU process has access to. Access to the filesystem may be local or via a network share protocol such as CIFS.
CVE-2018-16872
A flaw was found in qemu Media Transfer Protocol (MTP). The code openi ...
GHSA-w3c5-x9c8-47hc
A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the time lstat(2) was called in usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write access to the host filesystem shared with a guest can use this property to navigate the host filesystem in the context of the QEMU process and read any file the QEMU process has access to. Access to the filesystem may be local or via a network share protocol such as CIFS.

BDU:2020-00749
Уязвимость реализации протокола qemu Media Transfer Protocol эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю получить несанкционированный доступ к информации

SUSE-SU-2019:0471-2
Security update for qemu

SUSE-SU-2019:0471-1
Security update for qemu

openSUSE-SU-2019:0254-1
Security update for qemu

SUSE-SU-2019:0435-1
Security update for qemu

SUSE-SU-2019:0423-1
Security update for qemu
ELSA-2019-4518
ELSA-2019-4518: qemu security update (IMPORTANT)

SUSE-SU-2019:0489-1
Security update for qemu

openSUSE-SU-2019:1074-1
Security update for qemu

SUSE-SU-2019:0582-1
Security update for qemu
ELSA-2019-4556
ELSA-2019-4556: qemu security update (IMPORTANT)
ELSA-2019-4585
ELSA-2019-4585: qemu security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2018-16872 A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the time lstat(2) was called in usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write access to the host filesystem shared with a guest can use this property to navigate the host filesystem in the context of the QEMU process and read any file the QEMU process has access to. Access to the filesystem may be local or via a network share protocol such as CIFS. | CVSS3: 5.3 | 0% Низкий | больше 6 лет назад |
![]() | CVE-2018-16872 A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the time lstat(2) was called in usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write access to the host filesystem shared with a guest can use this property to navigate the host filesystem in the context of the QEMU process and read any file the QEMU process has access to. Access to the filesystem may be local or via a network share protocol such as CIFS. | CVSS3: 5 | 0% Низкий | больше 6 лет назад |
![]() | CVE-2018-16872 A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the time lstat(2) was called in usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write access to the host filesystem shared with a guest can use this property to navigate the host filesystem in the context of the QEMU process and read any file the QEMU process has access to. Access to the filesystem may be local or via a network share protocol such as CIFS. | CVSS3: 5.3 | 0% Низкий | больше 6 лет назад |
CVE-2018-16872 A flaw was found in qemu Media Transfer Protocol (MTP). The code openi ... | CVSS3: 5.3 | 0% Низкий | больше 6 лет назад | |
GHSA-w3c5-x9c8-47hc A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the time lstat(2) was called in usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write access to the host filesystem shared with a guest can use this property to navigate the host filesystem in the context of the QEMU process and read any file the QEMU process has access to. Access to the filesystem may be local or via a network share protocol such as CIFS. | CVSS3: 5.3 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2020-00749 Уязвимость реализации протокола qemu Media Transfer Protocol эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю получить несанкционированный доступ к информации | CVSS3: 5.3 | 0% Низкий | около 7 лет назад |
![]() | SUSE-SU-2019:0471-2 Security update for qemu | около 6 лет назад | ||
![]() | SUSE-SU-2019:0471-1 Security update for qemu | больше 6 лет назад | ||
![]() | openSUSE-SU-2019:0254-1 Security update for qemu | около 6 лет назад | ||
![]() | SUSE-SU-2019:0435-1 Security update for qemu | больше 6 лет назад | ||
![]() | SUSE-SU-2019:0423-1 Security update for qemu | больше 6 лет назад | ||
ELSA-2019-4518 ELSA-2019-4518: qemu security update (IMPORTANT) | больше 6 лет назад | |||
![]() | SUSE-SU-2019:0489-1 Security update for qemu | больше 6 лет назад | ||
![]() | openSUSE-SU-2019:1074-1 Security update for qemu | около 6 лет назад | ||
![]() | SUSE-SU-2019:0582-1 Security update for qemu | больше 6 лет назад | ||
ELSA-2019-4556 ELSA-2019-4556: qemu security update (IMPORTANT) | больше 6 лет назад | |||
ELSA-2019-4585 ELSA-2019-4585: qemu security update (IMPORTANT) | больше 6 лет назад |
Уязвимостей на страницу