First published: Thu Nov 19 2020(Updated: )
libuci in OpenWrt before 18.06.9 and 19.x before 19.07.5 may encounter a use after free when using malicious package names. This is related to uci_parse_package in file.c and uci_strdup in util.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenWrt OpenWrt | <18.06.9 | |
OpenWrt OpenWrt | >=19.07.0<19.07.5 |
https://git.openwrt.org/?p=openwrt/openwrt.git;a=commit;h=5625f5bc36954d644cb80adf8de47854c65d91c3
https://git.openwrt.org/?p=project/uci.git;a=commit;h=a3e650911f5e6f67dcff09974df3775dfd615da6
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-28951 is a vulnerability in libuci in OpenWrt before 18.06.9 and 19.x before 19.07.5 that may result in a use after free when using malicious package names.
CVE-2020-28951 affects OpenWrt versions before 18.06.9 and 19.x before 19.07.5 by introducing a use after free vulnerability in libuci when using malicious package names.
CVE-2020-28951 has a severity rating of critical with a CVSS score of 9.8.
To fix CVE-2020-28951, it is recommended to update to OpenWrt version 18.06.9 or 19.07.5 or later.
Yes, you can find references for CVE-2020-28951 at the following URLs: [Reference 1](https://git.openwrt.org/?p=openwrt/openwrt.git;a=commit;h=5625f5bc36954d644cb80adf8de47854c65d91c3), [Reference 2](https://git.openwrt.org/?p=openwrt/openwrt.git;a=log;h=refs/tags/v18.06.9), [Reference 3](https://git.openwrt.org/?p=project/uci.git;a=commit;h=a3e650911f5e6f67dcff09974df3775dfd615da6)