First published: Mon Jun 08 2020(Updated: )
An issue was discovered in LinuxTV xawtv before 3.107. The function dev_open() in v4l-conf.c does not perform sufficient checks to prevent an unprivileged caller of the program from opening unintended filesystem paths. This allows a local attacker with access to the v4l-conf setuid-root program to test for the existence of arbitrary files and to trigger an open on arbitrary files with mode O_RDWR. To achieve this, relative path components need to be added to the device path, as demonstrated by a v4l-conf -c /dev/../root/.bash_history command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/xawtv | <3.103-3+ | 3.103-3+ |
debian/xawtv | 3.107-1 3.107-1.1 3.107-2 | |
LinuxTV xawtv | <3.107 | |
Debian GNU/Linux | =8.0 | |
openSUSE Backports | =15.0-sp1 | |
openSUSE | =15.1 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
Ubuntu Linux | =16.04 | |
Debian | =8.0 | |
Fedora | =31 | |
Fedora | =32 | |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13696 has a medium severity rating due to its potential for unauthorized local access.
To fix CVE-2020-13696, upgrade xawtv to version 3.107 or later.
CVE-2020-13696 affects LinuxTV xawtv versions prior to 3.107, including specific versions in Debian and Ubuntu.
CVE-2020-13696 cannot be exploited remotely as it requires local access to the affected system.
Local attackers with access to the v4l-conf setuid-root program on vulnerable systems are at risk for CVE-2020-13696.