Email or username:

Password:

Forgot your password?
Top-level
Michael Stanclift

There have been two sets of CVEs that were released for Mastodon this year. One set on July 6, and one set on September 19.

The July 6 set was particularly serious, and there was a big push to get folks to upgrade off 4.1.2 and other vulnerable branches.

According to FediDB data, 16.2% of instances are remaining on versions still exposed by the July 6 CVEs or an unknown end of life versions that wasn't evaluated but may contain those same issues.

33.0% are impacted by the September 19 CVEs.

#MastoAdmin

8 comments
JL Johnson :veri_mast:

@vmstan I wonder if bad actors could use outdated instances to attack the up-to-date ones? Is there some setting somewhere to "break up" with instances that are X days/versions out of date?

Michael Stanclift

I'm not a statistician, but there are a few things to consider in all this.

FediDB is a really good source of truth, but there is no single source of who runs what versions.

There is a possibility that folks individually patched their instances with the relevant CVE fixes but otherwise remained on older versions.

There are a number of dead instances in FediDB, where they may have been polled when their version was the latest and greatest, and then disappeared from the Fediverse.

Michael Stanclift

Something else to consider, but that I've not figured out a great way to poll yet, is the user representation of those on out-dated installs.

The largest instances in the network tend to have administrators who are aware of updates, and apply them regularly (especially when it's security related) either because they care, because their users ask them to, or because they're on managed providers that handle it for them.

Sorted by monthly active users:
10 of 10
19 of 20
46 of 50
92 of 100

Are all patched.

Something else to consider, but that I've not figured out a great way to poll yet, is the user representation of those on out-dated installs.

The largest instances in the network tend to have administrators who are aware of updates, and apply them regularly (especially when it's security related) either because they care, because their users ask them to, or because they're on managed providers that handle it for them.

stuart

@vmstan

A useful feature would be for Admins to automatically block instances below a security version level. Might encourage recalcitrant Admins to catch up.

Paging @Gargron

Emelia πŸ‘ΈπŸ»

@stuart @vmstan @Gargron mastodon currently doesn't collect nor store information on the instances it's federating with, afaik, so this would be hard to do, without a change to collect that data.

stuart

@thisismissem @vmstan @Gargron

The information is there in the api which known instances could be sampled daily. Only it might get complicated with instances not using Mastodon. Perhaps introducing a unique version code like mstdn.4.x.x or kbin.x.x.x might help.

Vulnerabilities occur elsewhere. Might be useful if a gihub account of another distribution gets compromised and they need to be locked out until proven safe.

Just a suggestion going forward if other distributions would co-operate.

Emelia πŸ‘ΈπŸ»

@stuart @vmstan yes, the information may be in the API & available via say nodeinfo, but Mastodon doesn't actually store data about instances, just the known accounts & domain blocks.

tbh, this would possibly be better done via an advisory list.

Go Up