CVE-2024-5290

NameCVE-2024-5290
DescriptionAn issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-5739-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
wpa (PTS)bullseye (security), bullseye2:2.9.0-21+deb11u2fixed
bookworm, bookworm (security)2:2.10-12+deb12u2fixed
sid, trixie2:2.10-22fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
wpasourcebullseye2:2.9.0-21+deb11u2DSA-5739-1
wpasourcebookworm2:2.10-12+deb12u2DSA-5739-1
wpasource(unstable)2:2.10-22

Notes

https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/2067613

Search for package or bug name: Reporting problems