minidlna: ignore CVE-2024-51442

Details: https://nvd.nist.gov/vuln/detail/CVE-2024-51442

The description of the vulnerability says "attacker [...] execute arbitrary
OS commands via a specially crafted minidlna.conf configuration file".

There is no official fix for this CVE, and upstream seems to be inactive
for the past 3 years.

The reason for ignoring this CVE is that the referenced minidlna.conf
file is in the /etc folder, and the file is not world-writable. Which
means that this vulnerability can be exploited only when someone is
root - but if the attacker is already root, they don't need to resort
to minidlna config-file modifications to execute any command they want.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
This commit is contained in:
Gyorgy Sarvari 2026-02-23 20:18:43 +01:00 committed by Khem Raj
parent a4583e0e80
commit 1f70d339eb
No known key found for this signature in database
GPG Key ID: BB053355919D3314

View File

@ -43,3 +43,4 @@ SYSTEMD_SERVICE:${PN} = "minidlna.service"
INITSCRIPT_NAME = "minidlna"
INITSCRIPT_PARAMS = "defaults 90"
CVE_STATUS[CVE-2024-51442] = "not-applicable-config: vulnerability requires root access"