Skip to content
Snippets Groups Projects
Unverified Commit 7332d337 authored by Matthias Schiffer's avatar Matthias Schiffer
Browse files

docs: releases/v2021.1.2: describe autoupdater security issue

parent 2b5d4b88
No related branches found
No related tags found
No related merge requests found
...@@ -4,6 +4,9 @@ Gluon 2021.1.2 (unreleased) ...@@ -4,6 +4,9 @@ Gluon 2021.1.2 (unreleased)
Important notes Important notes
--------------- ---------------
This release fixes a **critical security vulnerability** in Gluon's
autoupdater.
Upgrades to v2021.1 and later releases are only supported from releases v2018.2 Upgrades to v2021.1 and later releases are only supported from releases v2018.2
and later. Migration code for upgrades from older versions has been removed to and later. Migration code for upgrades from older versions has been removed to
simplify maintenance. simplify maintenance.
...@@ -23,11 +26,30 @@ log. ...@@ -23,11 +26,30 @@ log.
Bugfixes Bugfixes
-------- --------
* **[SECURITY]** This release will fix a critical security vulnerability * **[SECURITY]** Autoupdater: Fix signature verification
A recently discovered issue (CVE-2022-24884) in the *ecdsautils* package
allows forgery of cryptographic signatures. This vulnerability can be
exploited to create a manifest accepted by the autoupdater without knowledge
of the signers' private keys. By intercepting nodes' connections to the update
server, such a manifest allows to distribute malicious firmware updates.
This is a **critical** vulnerability. All nodes with autoupdater must be
updated. Requiring multiple signatures for an update does *not* mitigate the
issue.
As a temporary workaround, the issue can be mitigated on individual nodes by
disabling the autoupdater via config mode or using the following commands::
uci set autoupdater.settings.enabled=0
uci commit autoupdater
A fixed firmware should be installed manually before enabling the autoupdater
again.
This bugfix has not been pushed to the public Gluon repository yet to avoid See security advisory `GHSA-qhcg-9ffp-78pw
disclosing information on the issue. A detailed advisory will be published at <https://github.com/freifunk-gluon/ecdsautils/security/advisories/GHSA-qhcg-9ffp-78pw>`_
the same time as the Gluon release. for further information on this vulnerability.
* **[SECURITY]** Config Mode: Prevent Cross-Site Request Forgery (CSRF) * **[SECURITY]** Config Mode: Prevent Cross-Site Request Forgery (CSRF)
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment