diff options
| author | Gyorgy Sarvari <skandigraun@gmail.com> | 2026-02-23 20:18:43 +0100 |
|---|---|---|
| committer | Khem Raj <raj.khem@gmail.com> | 2026-02-24 22:30:28 -0800 |
| commit | 1f70d339eb3d3f4897f3eef91ae86fd915cbfa8c (patch) | |
| tree | eabff2d87e967f8d674abaa4c0daec56c3157912 | |
| parent | a4583e0e8012fe661bc2622aab63554324a3c72d (diff) | |
| download | meta-openembedded-1f70d339eb3d3f4897f3eef91ae86fd915cbfa8c.tar.gz | |
minidlna: ignore CVE-2024-51442
Details: https://nvd.nist.gov/vuln/detail/CVE-2024-51442
The description of the vulnerability says "attacker [...] execute arbitrary
OS commands via a specially crafted minidlna.conf configuration file".
There is no official fix for this CVE, and upstream seems to be inactive
for the past 3 years.
The reason for ignoring this CVE is that the referenced minidlna.conf
file is in the /etc folder, and the file is not world-writable. Which
means that this vulnerability can be exploited only when someone is
root - but if the attacker is already root, they don't need to resort
to minidlna config-file modifications to execute any command they want.
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
| -rw-r--r-- | meta-multimedia/recipes-multimedia/minidlna/minidlna.inc | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/meta-multimedia/recipes-multimedia/minidlna/minidlna.inc b/meta-multimedia/recipes-multimedia/minidlna/minidlna.inc index cb2a1865e8..0dd297098c 100644 --- a/meta-multimedia/recipes-multimedia/minidlna/minidlna.inc +++ b/meta-multimedia/recipes-multimedia/minidlna/minidlna.inc | |||
| @@ -43,3 +43,4 @@ SYSTEMD_SERVICE:${PN} = "minidlna.service" | |||
| 43 | INITSCRIPT_NAME = "minidlna" | 43 | INITSCRIPT_NAME = "minidlna" |
| 44 | INITSCRIPT_PARAMS = "defaults 90" | 44 | INITSCRIPT_PARAMS = "defaults 90" |
| 45 | 45 | ||
| 46 | CVE_STATUS[CVE-2024-51442] = "not-applicable-config: vulnerability requires root access" | ||
