Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
F
FFS Gluon
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Deploy
Releases
Model registry
Monitor
Incidents
Analyze
Value stream analytics
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
firmware
FFS Gluon
Commits
7332d337
Unverified
Commit
7332d337
authored
3 years ago
by
Matthias Schiffer
Browse files
Options
Downloads
Patches
Plain Diff
docs: releases/v2021.1.2: describe autoupdater security issue
parent
2b5d4b88
No related branches found
No related tags found
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
docs/releases/v2021.1.2.rst
+26
-4
26 additions, 4 deletions
docs/releases/v2021.1.2.rst
with
26 additions
and
4 deletions
docs/releases/v2021.1.2.rst
+
26
−
4
View file @
7332d337
...
@@ -4,6 +4,9 @@ Gluon 2021.1.2 (unreleased)
...
@@ -4,6 +4,9 @@ Gluon 2021.1.2 (unreleased)
Important notes
Important notes
---------------
---------------
This release fixes a **critical security vulnerability** in Gluon's
autoupdater.
Upgrades to v2021.1 and later releases are only supported from releases v2018.2
Upgrades to v2021.1 and later releases are only supported from releases v2018.2
and later. Migration code for upgrades from older versions has been removed to
and later. Migration code for upgrades from older versions has been removed to
simplify maintenance.
simplify maintenance.
...
@@ -23,11 +26,30 @@ log.
...
@@ -23,11 +26,30 @@ log.
Bugfixes
Bugfixes
--------
--------
* **[SECURITY]** This release will fix a critical security vulnerability
* **[SECURITY]** Autoupdater: Fix signature verification
A recently discovered issue (CVE-2022-24884) in the *ecdsautils* package
allows forgery of cryptographic signatures. This vulnerability can be
exploited to create a manifest accepted by the autoupdater without knowledge
of the signers' private keys. By intercepting nodes' connections to the update
server, such a manifest allows to distribute malicious firmware updates.
This is a **critical** vulnerability. All nodes with autoupdater must be
updated. Requiring multiple signatures for an update does *not* mitigate the
issue.
As a temporary workaround, the issue can be mitigated on individual nodes by
disabling the autoupdater via config mode or using the following commands::
uci set autoupdater.settings.enabled=0
uci commit autoupdater
A fixed firmware should be installed manually before enabling the autoupdater
again.
This bugfix has not been pushed to the public Gluon repository yet to avoid
See security advisory `GHSA-qhcg-9ffp-78pw
disclosing information on the issue. A detailed advisory will be published at
<https://github.com/freifunk-gluon/ecdsautils/security/advisories/GHSA-qhcg-9ffp-78pw>`_
the same time as the Gluon release
.
for further information on this vulnerability
.
* **[SECURITY]** Config Mode: Prevent Cross-Site Request Forgery (CSRF)
* **[SECURITY]** Config Mode: Prevent Cross-Site Request Forgery (CSRF)
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment