First published: Wed Aug 07 2024(Updated: )
An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.
Credit: security@ubuntu.com security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wpa | 2:2.9.0-21+deb11u2 2:2.10-12+deb12u2 2:2.10-22 | |
All of | ||
wpa_supplicant | ||
Ubuntu |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5290 is classified as a high severity vulnerability that allows local unprivileged attackers to escalate their privileges.
To fix CVE-2024-5290, upgrade the wpa_supplicant package to a version that is not vulnerable, such as 2:2.9.0-21+deb11u2, 2:2.10-12+deb12u2, or 2:2.10-22.
CVE-2024-5290 affects users running vulnerable versions of wpa_supplicant on Ubuntu systems.
CVE-2024-5290 primarily impacts Ubuntu Linux systems that utilize the wpa_supplicant package.
CVE-2024-5290 allows local attackers to load arbitrary shared objects, leading to potential privilege escalation.