jeffv via plug on 10 Dec 2024 06:27:28 -0800
|
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
[PLUG] OpenWrt Sysupgrade flaw
|
- From: jeffv via plug <plug@lists.phillylinux.org>
- To: Philadelphia Linux User's Group Discussion List <plug@lists.phillylinux.org>
- Subject: [PLUG] OpenWrt Sysupgrade flaw
- Date: Tue, 10 Dec 2024 09:27:22 -0500
- Authentication-results: smtp03.aqua.email-ash1.sync.lan smtp.user=<hidden>; auth=pass (LOGIN)
- Dkim-signature: v=1; a=rsa-sha1; d=op.net; s=20180222; c=relaxed/simple; q=dns/txt; i=@op.net; t=1733840843; h=From:Subject:Date:To:MIME-Version:Content-Type; bh=++Yxx+VKGht/hPPjxGs3/03y7so=; b=nhad6VP9HGu9o/43LFvgoXa3AP+mTGcSdjjr8Mj7c00jfGZ57nl7faeE6Bh9NNpr 446pH+6PeG6LMP/fi41NdpMpJKLkWMatZvMJn50MuB9D2an0y01UhixweZwDvHZZ Md7Mai2u9aQWAfkGWa/cgqkwwVF+D2ad+zLrk7U4REKNKBpvBjtSesh9ewe2dnP4 kKLDf1GkqlqAVfuubqapa+tTI6wP+PcrVnozHwTRNtx9Pct6cL7EOMSvk8NRi4b9 3Qi7dqI9uJ6inxuVkCtRAKa5+jB3NP1FHxH/tn/nITTBjERA7DcRngERJLw5kgb1 dktiWjnMgB3iKDliRqBeaA==;
- Reply-to: jeffv <jeffv@op.net>
- Sender: "plug" <plug-bounces@lists.phillylinux.org>
- User-agent: Mozilla Thunderbird
OpenWrt Sysupgrade flaw let hackers push malicious firmware images
https://www.bleepingcomputer.com/news/security/openwrt-sysupgrade-flaw-let-hackers-push-malicious-firmware-images/
A flaw in OpenWrt's Attended Sysupgrade feature used to build custom,
on-demand firmware images could have allowed for the distribution of
malicious firmware packages.
___________________________________________________________________________
Philadelphia Linux Users Group -- http://www.phillylinux.org
Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce
General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug