CVE-2020-13696
08.06.2020, 17:15
An issue was discovered in LinuxTV xawtv before 3.107. The function dev_open() in v4l-conf.c does not perform sufficient checks to prevent an unprivileged caller of the program from opening unintended filesystem paths. This allows a local attacker with access to the v4l-conf setuid-root program to test for the existence of arbitrary files and to trigger an open on arbitrary files with mode O_RDWR. To achieve this, relative path components need to be added to the device path, as demonstrated by a v4l-conf -c /dev/../root/.bash_history command.Enginsight
Vendor | Product | Version |
---|---|---|
linuxtv | xawtv | 𝑥 < 3.107 |
debian | debian_linux | 8.0 |
opensuse | backports_sle | 15.0:sp1 |
opensuse | leap | 15.1 |
canonical | ubuntu_linux | 16.04 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
References