CVE-2020-13696

An issue was discovered in LinuxTV xawtv before 3.107. The function dev_open() in v4l-conf.c does not perform sufficient checks to prevent an unprivileged caller of the program from opening unintended filesystem paths. This allows a local attacker with access to the v4l-conf setuid-root program to test for the existence of arbitrary files and to trigger an open on arbitrary files with mode O_RDWR. To achieve this, relative path components need to be added to the device path, as demonstrated by a v4l-conf -c /dev/../root/.bash_history command.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.4 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 13%
VendorProductVersion
linuxtvxawtv
𝑥
< 3.107
debiandebian_linux
8.0
opensusebackports_sle
15.0:sp1
opensuseleap
15.1
canonicalubuntu_linux
16.04
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
xawtv
bullseye
3.107-1
fixed
stretch
no-dsa
bookworm
3.107-1.1
fixed
sid
3.107-2.1
fixed
trixie
3.107-2.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
xawtv
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
not-affected
focal
needs-triage
eoan
ignored
bionic
needs-triage
xenial
Fixed 3.103-3+deb8u1build0.16.04.1
released
trusty
dne
References