Debian Security Advisory
DLA-2246-1 xawtv -- LTS security update
- Date Reported:
- 12 Jun 2020
- Affected Packages:
- xawtv
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 962221.
In Mitre's CVE dictionary: CVE-2020-13696. - More information:
-
An issue was discovered in LinuxTV xawtv before 3.107. The function dev_open() in v4l-conf.c does not perform sufficient checks to prevent an unprivileged caller of the program from opening unintended filesystem paths. This allows a local attacker with access to the v4l-conf setuid-root program to test for the existence of arbitrary files and to trigger an open on arbitrary files with mode O_RDWR. To achieve this, relative path components need to be added to the device path, as demonstrated by a v4l-conf -c /dev/../root/.bash_history command.
For Debian 8
Jessie
, this problem has been fixed in version 3.103-3+deb8u1.We recommend that you upgrade your xawtv packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS