Skip to content
Snippets Groups Projects
Commit 808700d1 authored by Peter Marko's avatar Peter Marko Committed by Steve Sakoman
Browse files

wpa-supplicant: Ignore CVE-2024-5290

NVD CVE report [1] links Ubuntu bug [2] which has a very good
description/discussion about this issue.
It applies only to distros patching wpa-supplicant to allow non-root
users (e.g. via netdev group) to load modules.
This is not the case of Yocto.

Quote:
So upstream isn't vulnerable as they only expose the dbus interface to
root. Downstreams like Ubuntu and Chromium added a patch that grants
access to the netdev group. The patch is the problem, not the upstream
code IMHO.

There is also a commit [3] associated with this CVE, however that only
provides build-time configuration to limit paths which can be accessed
but it acts only as a mitigation for distros which allow non-root users
to load crafted modules.

[1] https://nvd.nist.gov/vuln/detail/CVE-2024-5290
[2] https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/2067613
[3] https://w1.fi/cgit/hostap/commit/?id=c84388ee4c66bcd310db57489eac4a75fc600747



(From OE-Core rev: 603047ab3c85009c384793cdbdd8e6ae1aebd737)

Signed-off-by: default avatarPeter Marko <peter.marko@siemens.com>
Signed-off-by: default avatarSteve Sakoman <steve@sakoman.com>
parent 3a172a5a
No related branches found
No related tags found
No related merge requests found
......@@ -31,6 +31,9 @@ SRC_URI[sha256sum] = "20df7ae5154b3830355f8ab4269123a87affdea59fe74fe9292a91d0d7
CVE_PRODUCT = "wpa_supplicant"
# not-applicable-platform: this only affects Ubuntu and other platforms patching wpa-supplicant
CVE_CHECK_IGNORE += "CVE-2024-5290"
S = "${WORKDIR}/wpa_supplicant-${PV}"
PACKAGES:prepend = "wpa-supplicant-passphrase wpa-supplicant-cli "
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment