docs: releases/v2021.1.2: describe autoupdater security issue

This commit is contained in:
Matthias Schiffer 2022-05-04 20:01:53 +02:00
parent 2b5d4b88b4
commit 7332d33775
No known key found for this signature in database
GPG Key ID: 16EF3F64CB201D9C

View File

@ -4,6 +4,9 @@ Gluon 2021.1.2 (unreleased)
Important notes
---------------
This release fixes a **critical security vulnerability** in Gluon's
autoupdater.
Upgrades to v2021.1 and later releases are only supported from releases v2018.2
and later. Migration code for upgrades from older versions has been removed to
simplify maintenance.
@ -23,11 +26,30 @@ log.
Bugfixes
--------
* **[SECURITY]** This release will fix a critical security vulnerability
* **[SECURITY]** Autoupdater: Fix signature verification
This bugfix has not been pushed to the public Gluon repository yet to avoid
disclosing information on the issue. A detailed advisory will be published at
the same time as the Gluon release.
A recently discovered issue (CVE-2022-24884) in the *ecdsautils* package
allows forgery of cryptographic signatures. This vulnerability can be
exploited to create a manifest accepted by the autoupdater without knowledge
of the signers' private keys. By intercepting nodes' connections to the update
server, such a manifest allows to distribute malicious firmware updates.
This is a **critical** vulnerability. All nodes with autoupdater must be
updated. Requiring multiple signatures for an update does *not* mitigate the
issue.
As a temporary workaround, the issue can be mitigated on individual nodes by
disabling the autoupdater via config mode or using the following commands::
uci set autoupdater.settings.enabled=0
uci commit autoupdater
A fixed firmware should be installed manually before enabling the autoupdater
again.
See security advisory `GHSA-qhcg-9ffp-78pw
<https://github.com/freifunk-gluon/ecdsautils/security/advisories/GHSA-qhcg-9ffp-78pw>`_
for further information on this vulnerability.
* **[SECURITY]** Config Mode: Prevent Cross-Site Request Forgery (CSRF)