Openwrt ASU Security Update Advisory (CVE-2024-54143)
Overview
An update has been released to address vulnerabilities in Openwrt ASU. Users of the affected versions are advised to update to the latest version.
Affected Products
CVE-2024-54143
- Openwrt ASU versions: ~ 920c8a1 (excluded)
Resolved Vulnerabilities
Request hashing mechanism in OpenWrt/ASU uses only 12 characters in SHA-256 hashes, increasing the likelihood of a collision, which could allow malicious firmware images to be distributed (CVE-2024-54143)
Vulnerability Patches
Vulnerability patches have been made available in the latest update. Please follow the instructions on the Referenced Sites to update to the latest Vulnerability Patches version.
CVE-2024-54143
- Openwrt ASU version: 920c8a1
Referenced Sites
[1] CVE-2024-54143 Detail
https://nvd.nist.gov/vuln/detail/CVE-2024-54143
[2] Build artifact poisoning via truncated SHA-256 hash and command injection
https://github.com/openwrt/asu/security/advisories/GHSA-r3gq-96h6-3v7q