Gyorgy Sarvari 1f70d339eb
minidlna: ignore CVE-2024-51442
Details: https://nvd.nist.gov/vuln/detail/CVE-2024-51442

The description of the vulnerability says "attacker [...] execute arbitrary
OS commands via a specially crafted minidlna.conf configuration file".

There is no official fix for this CVE, and upstream seems to be inactive
for the past 3 years.

The reason for ignoring this CVE is that the referenced minidlna.conf
file is in the /etc folder, and the file is not world-writable. Which
means that this vulnerability can be exploited only when someone is
root - but if the attacker is already root, they don't need to resort
to minidlna config-file modifications to execute any command they want.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2026-02-24 22:30:28 -08:00
..
2025-12-10 11:31:59 -08:00
2024-06-14 10:20:37 -07:00
2025-08-18 17:58:58 -07:00
2026-02-20 23:34:18 -08:00
2025-09-24 10:54:43 -07:00
2025-11-29 21:19:16 -08:00
2025-11-23 17:58:13 -08:00
2025-10-06 11:35:24 -07:00
2025-11-21 00:39:01 -08:00
2026-02-24 22:30:28 -08:00
2024-12-24 08:23:09 -08:00
2026-02-20 23:34:22 -08:00
2025-12-11 19:42:20 -08:00
2026-02-20 23:34:21 -08:00
2025-07-10 10:46:21 -07:00