diff --git a/audits/2024-12-10-X41-D-Sec.md b/audits/2024-12-10-X41-D-Sec.md index b012d6522099..473ae3be56e2 100644 --- a/audits/2024-12-10-X41-D-Sec.md +++ b/audits/2024-12-10-X41-D-Sec.md @@ -65,7 +65,7 @@ Additionally, three issues without a direct security impact were identified. Mullvad implemented fixes for four of the issues during the audit, and released a new version of the app on the affected platforms around the time when we were handed the final audit report. -### __MLLVD-CR-24-01__: Signal Handler Alternate Stack Too Small +### __MLLVD-CR-24-01__: Signal Handler Alternate Stack Too Small (Severity: High) The alternative stack configured for the fault signal handler in `mullvad-daemon` was too small. @@ -88,7 +88,7 @@ immediately mark existing apps as unsupported, but to release a fixed app versio as the audit was complete. We still recommend users on the affected platforms to upgrade to the latest version of the app at their earliest convenience. -### __MLLVD-CR-24-02__: Signal Handler Uses Non-Reentrant Safe Functions +### __MLLVD-CR-24-02__: Signal Handler Uses Non-Reentrant Safe Functions (Severity: High) The fault signal handler in `mullvad-daemon` called functions which are not signal @@ -114,7 +114,7 @@ has been around for multiple years without any practical issues surfacing. So ju `MLLVD-CR-24-01` above, we decided to not release any quick patch release immediately, but instead wait for the audit to finish and release fixes for all audit findings at the same time. -### __MLLVD-CR-24-03__: Virtual IP Address of Tunnel Device Leaks to Network Adjacent Participant +### __MLLVD-CR-24-03__: Virtual IP Address of Tunnel Device Leaks to Network Adjacent Participant (Severity: Medium) The Linux kernel (and consequently Android) by default replies to ARP requests for any local @@ -149,7 +149,7 @@ When this has been deployed, the issue will be gone on Android also. [known issues]: ../docs/known-issues.md#MLLVD-CR-24-03 -### __MLLVD-CR-24-04__: Deanonymization Through NAT +### __MLLVD-CR-24-04__: Deanonymization Through NAT (Severity: Medium) All UDP connections from a client to some service on the internet have a corresponding entry in the @@ -192,7 +192,7 @@ Mullvad does not plan to actively mitigate this issue further in the app. The at hard to carry out, and can be prevented further by enabling multihop and/or DAITA. Concerned users can also choose to avoid using UDP to communicate with sensitive services. -### __MLLVD-CR-24-05__: Deanonymization Through MTU +### __MLLVD-CR-24-05__: Deanonymization Through MTU (Severity: Low) This attack is about how an attacker that can both observe a user's tunnel traffic and also @@ -229,7 +229,7 @@ need to protect against. We agree with the severity rating being set to *low* on this issue, since it requires a powerful attacker and only provide them with heuristics to make qualified guesses about who the client is. -### __MLLVD-CR-24-06__: Windows installer runs adjacent taskkill.exe +### __MLLVD-CR-24-06__: Windows installer runs adjacent taskkill.exe (Severity: High) The Windows installer for the Mullvad VPN app invokes `taskkill.exe` in some places to kill