Skip to content
Snippets Groups Projects
Select Git revision
  • 15bb6b6e93fd0733a9feb877d2091acc3c80fb16
  • experimental default protected
  • v2023.2.5-ffs
  • nrb/ex400-remove-wps
  • nrb/airmax-test
  • v2023.2.4-ffs
  • nrb/ar9344-reset-sequence
  • autinerd/experimental-openwrt-24.10
  • v2023.2.3-ffs
  • v2023.2.2-ffs
  • v2023.2-ffs
  • v2023.1-ffs
  • v2022.1.4-ffs
  • feature/addMikrotikwAP
  • v2022.1.3-ffs
  • v2021.1.2-ffs
  • v2022.1.1-ffs
  • master protected
  • v2021.1.1-ffs
  • nrb/gluon-master-cpe510
  • v2021.1-ffs
  • experimental-2025-10-23
  • experimental-2025-10-23-base
  • experimental-2025-10-22
  • experimental-2025-10-22-base
  • experimental-2025-10-19
  • experimental-2025-10-19-base
  • experimental-2025-10-15
  • experimental-2025-10-15-base
  • experimental-2025-10-12
  • experimental-2025-10-12-base
  • experimental-2025-10-06
  • experimental-2025-10-06-base
  • experimental-2025-10-02
  • experimental-2025-10-02-base
  • experimental-2025-09-19
  • experimental-2025-09-19-base
  • experimental-2025-09-15
  • experimental-2025-09-15-base
  • experimental-2025-09-12
  • experimental-2025-09-12-base
41 results

v2022.1.1.rst

Blame
  • user avatar
    Jan-Niklas Burfeind authored and GitHub committed
    follow-up on
    
    commit 854fef4e ("docs: consistently indent .rst files with 2 spaces")
    047f4fb0
    History
    v2022.1.1.rst 2.83 KiB

    Gluon 2022.1.1

    Important notes

    This release mitigates multiple flaws in the Linux wireless stack fixing RCE and DoS vulnerabilities.

    Added hardware support

    ipq40xx-generic

    • GL.iNet
      • GL-AP1300

    mpc85xx-p1010

    • TP-Link
      • TL-WDR4900 (v1)

    ramips-mt7621

    • ZyXEL
      • NWA50AX

    rockchip-armv8

    • FriendlyElec
      • NanoPi R4S (4GB LPDDR4)

    Bugfixes

    • Multiple mitigations for (critical vulnerabilities) in the Linux kernel WLAN stack. This only concerns Gluon v2022.1, older Gluon versions are unaffected.
      • CVE-2022-41674
      • CVE-2022-42719
      • CVE-2022-42720
      • CVE-2022-42721
      • CVE-2022-42722
    • Fixes security issues in WolfSSL. People who have installed additional, non-Gluon packages which rely on WolfSSL's TLS 1.3 implementation might be affected. Firmwares using either gluon-mesh-wireless-sae or gluon-wireless-encryption-wpa3 are unaffected by these issues, since only WPA-Enterprise relies on the affected TLS functionality.
      • CVE-2022-38152
      • CVE-2022-39173
    • Fixes the update path for GL-AR300M and NanoStation Loco M2/M5 (XW) devices.

    Known issues

    • A workaround for Android devices not waking up to their MLD subscriptions was removed, potentially breaking IPv6 connectivity for these devices after extended sleep periods. (#2672)

    • Upgrading EdgeRouter-X from versions before v2020.1.x may lead to a soft-bricked state due to bad blocks on the NAND flash which the NAND driver before this release does not handle well. (#1937)

    • The integration of the BATMAN_V routing algorithm is incomplete.

      • Mesh neighbors don't appear on the status page. (#1726) Many tools have the BATMAN_IV metric hardcoded, these need to be updated to account for the new throughput metric.
      • Throughput values are not correctly acquired for different interface types. (#1728) This affects virtual interface types like bridges and VXLAN.
    • Default TX power on many Ubiquiti devices is too high, correct offsets are unknown (#94)

      Reducing the TX power in the Advanced Settings is recommended.

    • In configurations without VXLAN, the MAC address of the WAN interface is modified even when Mesh-on-WAN is disabled (#496)

      This may lead to issues in environments where a fixed MAC address is expected (like VMware when promiscuous mode is disallowed).