docs: releases/v2021.1.2: describe autoupdater security issue

This commit is contained in:
Matthias Schiffer 2022-05-04 20:01:53 +02:00
parent 2b5d4b88b4
commit 7332d33775
No known key found for this signature in database
GPG Key ID: 16EF3F64CB201D9C

View File

@ -4,6 +4,9 @@ Gluon 2021.1.2 (unreleased)
Important notes Important notes
--------------- ---------------
This release fixes a **critical security vulnerability** in Gluon's
autoupdater.
Upgrades to v2021.1 and later releases are only supported from releases v2018.2 Upgrades to v2021.1 and later releases are only supported from releases v2018.2
and later. Migration code for upgrades from older versions has been removed to and later. Migration code for upgrades from older versions has been removed to
simplify maintenance. simplify maintenance.
@ -23,11 +26,30 @@ log.
Bugfixes Bugfixes
-------- --------
* **[SECURITY]** This release will fix a critical security vulnerability * **[SECURITY]** Autoupdater: Fix signature verification
This bugfix has not been pushed to the public Gluon repository yet to avoid A recently discovered issue (CVE-2022-24884) in the *ecdsautils* package
disclosing information on the issue. A detailed advisory will be published at allows forgery of cryptographic signatures. This vulnerability can be
the same time as the Gluon release. exploited to create a manifest accepted by the autoupdater without knowledge
of the signers' private keys. By intercepting nodes' connections to the update
server, such a manifest allows to distribute malicious firmware updates.
This is a **critical** vulnerability. All nodes with autoupdater must be
updated. Requiring multiple signatures for an update does *not* mitigate the
issue.
As a temporary workaround, the issue can be mitigated on individual nodes by
disabling the autoupdater via config mode or using the following commands::
uci set autoupdater.settings.enabled=0
uci commit autoupdater
A fixed firmware should be installed manually before enabling the autoupdater
again.
See security advisory `GHSA-qhcg-9ffp-78pw
<https://github.com/freifunk-gluon/ecdsautils/security/advisories/GHSA-qhcg-9ffp-78pw>`_
for further information on this vulnerability.
* **[SECURITY]** Config Mode: Prevent Cross-Site Request Forgery (CSRF) * **[SECURITY]** Config Mode: Prevent Cross-Site Request Forgery (CSRF)