Vulnerability Description
An issue was discovered in LinuxTV xawtv before 3.107. The function dev_open() in v4l-conf.c does not perform sufficient checks to prevent an unprivileged caller of the program from opening unintended filesystem paths. This allows a local attacker with access to the v4l-conf setuid-root program to test for the existence of arbitrary files and to trigger an open on arbitrary files with mode O_RDWR. To achieve this, relative path components need to be added to the device path, as demonstrated by a v4l-conf -c /dev/../root/.bash_history command.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linuxtv | Xawtv | < 3.107 |
| Debian | Debian Linux | 8.0 |
| Opensuse | Backports Sle | 15.0 |
| Opensuse | Leap | 15.1 |
| Fedoraproject | Fedora | 31 |
| Canonical | Ubuntu Linux | 16.04 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00009.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00013.htmlMailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2020/06/04/6Issue TrackingMailing ListThird Party Advisory
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2020-13696Broken LinkIssue TrackingThird Party Advisory
- https://git.linuxtv.org/xawtv3.git/commit/?id=31f31f9cbaee7be806cba38e0ff5431bd4PatchVendor Advisory
- https://git.linuxtv.org/xawtv3.git/commit/?id=36dc44e68e5886339b4a0fbe3f404fb1a4PatchVendor Advisory
- https://git.linuxtv.org/xawtv3.git/commit/?id=8e3feea862db68d3ca0886f46cd99fab45PatchVendor Advisory
- https://lists.debian.org/debian-lts-announce/2020/06/msg00018.htmlMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://usn.ubuntu.com/4518-1/Third Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00009.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00013.htmlMailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2020/06/04/6Issue TrackingMailing ListThird Party Advisory
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2020-13696Broken LinkIssue TrackingThird Party Advisory
FAQ
What is CVE-2020-13696?
CVE-2020-13696 is a vulnerability with a CVSS score of 4.4 (MEDIUM). An issue was discovered in LinuxTV xawtv before 3.107. The function dev_open() in v4l-conf.c does not perform sufficient checks to prevent an unprivileged caller of the program from opening unintended...
How severe is CVE-2020-13696?
CVE-2020-13696 has been rated MEDIUM with a CVSS base score of 4.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-13696?
Check the references section above for vendor advisories and patch information. Affected products include: Linuxtv Xawtv, Debian Debian Linux, Opensuse Backports Sle, Opensuse Leap, Fedoraproject Fedora.