Skip to content
Snippets Groups Projects

Compare revisions

Changes are shown as if the source revision was being merged into the target revision. Learn more about comparing revisions.

Source

Select target project
No results found

Target

Select target project
  • firmware/gluon
  • 0x4A6F/gluon
  • patrick/gluon
3 results
Show changes
Commits on Source (19)
  • Matthias Schiffer's avatar
    docs: move release notes TOC to sub page (#2422) · 2b5c1e57
    Matthias Schiffer authored
    This allows us to organize the TOC a bit better by adding sections per
    major version. We can even increase the maxdepth to 2 now, which looks
    great in my opinion.
    
    In addition, the full list of releases is not shown in the sidebar
    anymore when viewing a completely different part of the documentation,
    which took up more than half of the total sidebar entries.
    
    (cherry picked from commit 7ebc8814)
    Unverified
    2b5c1e57
  • Matthias Schiffer's avatar
    modules: update OpenWrt base · 5562682b
    Matthias Schiffer authored
    b24905c38a8a kernel: bump 4.14 to 4.14.274
    a518a4f78630 ath79: fix link for long cables with OCEDO Raccoon
    ea0e521d3706 kernel: bump 4.14 to 4.14.273
    0af411f49d43 zlib: backport security fix for a reproducible crash in compressor
    565159db573a kernel: bump 4.14 to 4.14.272
    c5c047f19bc5 openssl: bump to 1.1.1n
    6b8407c6da66 base-files: call "sync" after initial setup
    9ced994057ae kernel: bump 4.14 to 4.14.269
    5ecc7ead4878 imagebuilder: fix partition signature
    f49eec6335ea wolfssl: fix API breakage of SSL_get_verify_result
    cc344f1513ee ubus: backport fixes for UAF and other issues
    31bb27f35b95 wolfssl: bump to 5.1.1-stable
    572a1f9abe45 ar71xx: fix MikroTik wAP detection
    a2482fc3a57c OpenWrt v19.07.9: revert to branch defaults
    106382c27c25 OpenWrt v19.07.9: adjust config defaults
    2a3558b0de17 kernel: bump 4.14 to 4.14.267
    3b6ce4f634cc kernel: bump 4.14 to 4.14.266
    e7596ce0b085 hostapd: Apply SAE/EAP-pwd side-channel attack update 2
    1691c1168d15 mbedtls: Update to version 2.16.12
    419b9f4c4514 mbedtls: update to 2.16.11
    bfa4cccd46c3 tcpdump: libpcap: Remove http://www.us.tcpdump.org mirror
    e92a4e5458ff tcpdump: Fix CVE-2018-16301
    606106fb295e kernel: bump 4.14 to 4.14.265
    524cbcf6f5b0 build: store SOURCE_DATE_EPOCH in JSON info files
    57293f51c48f kernel: bump 4.14 to 4.14.264
    974161d7f891 kernel: bump 4.14 to 4.14.262
    b50eb70e01c6 openssl: bump to 1.1.1m
    5369ceb787b4 kernel: bump 4.14 to 4.14.261
    Unverified
    5562682b
  • Matthias Schiffer's avatar
    modules: update OpenWrt packages · 48f6a11e
    Matthias Schiffer authored
    5a842639dc87 nano: provide nano-full with most features enabled
    165c5625a3c6 netatalk: update to version 3.1.13
    7b9c8fd48743 coova-chilli: add dependency for miniportal
    6732d0573d62 coova-chilli: clean up Makefile
    6ac4167c7318 coova-chilli: remove dnslog option
    384c9dc68fed coova-chili: Fix version
    944bae08d00c coova-chilli: Update to 1.5
    3398ed29b0c0 python3: Update to 3.7.13, refresh patches
    e8dc42753c64 bind: bump to 9.16.27
    17e7ca6e2e66 syslog-ng: update to version 3.36.1
    79db9a8e246e expat: import patches for CVEs
    448eb6e4b999 expat: update to 2.2.10
    31098bd6b274 htpdate: drop www.freebsd.org from default server list
    4c461f9e8559 nano: update to 6.2
    8129d30e3653 nano: update to 6.1
    e234ea1ae48b ruby: update to 2.6.9
    c0c89af7c4fa bind: update to version 9.16.25
    56cf18027b67 CI: fix runtime testing for non master branch
    5578d60f9ad9 nano: Add a plus variant with more features
    864ffb6ca1b9 nss: backport patch for CVE-2021-43527
    0af741cd16ce prosody: update to version 0.11.13
    20e42ca81e02 prosody: fix shellcheck warnings
    0319712eda5e prosody: update to 0.11.7
    22a3a54a9c8a prosody: update to 0.11.5
    199860fa3ad3 prosody: /etc/prosody permissions fix
    498bcd4e25c7 prosody: Update to 0.11.3
    057803706e99 tvheadend: fix conffiles section
    765307772f15 domoticz: backport patch to fix compilation with uClibc-ng
    572392a8ac20 domoticz: bump to 4.10717
    8d91ba86a956 domoticz: Fix compilation without deprecated OpenSSL APIs
    7bb0a7e929cb netdata: Update init script to use -D rather than -nd
    6317eabad70e apache: security bump to 2.4.51
    4af8afe6ccde haveged: update to 1.9.17
    f299c29a45fc treewide: add missing BUILDONLY
    64d0238a1bef zsh: drop bash syntax in postinst
    ea3e54accd11 zsh: fix invalid postrm script and little refactor of scripts
    5a9b5ee78cd2 nano: update to version 6.0
    e1a2d908c3de msmtp: update to version 1.8.1.9
    535f4804b661 postgresql: security update to version 11.14
    e93fc5a20f57 libs/c-ares: fix domain hijacking CVE-2021-3672
    45218f20597b msmtp: update to version 1.8.17
    d216572bb147 syslog-ng: update to version 3.35.1
    1d5b64958b79 icu: Fix memory bug w/ baseName
    e1feccd5aeb7 ddns-scripts: Fix wrong whitespace in preinst and postinst scripts
    c559096e03e5 bind: update to version 9.16.23
    af8fe2363d07 cyrus-sasl: patch CVE-2019-19906
    903d79b3872b php7: Clean up and update distributed php.ini for php 7.2.34
    496f50a754cf syslog-ng: update to version 3.34.1
    61741b3249d6 ffmpeg: update to version 3.4.9 (security fix)
    9abe24fb49fa bind: Bump to 9.16.22
    cb4433c4baa1 tvheadend: update libhdhomerun
    18af9b9e2132 bind: update to version 9.16.21
    bb0ed00885eb nextdns: Update to version 1.37.3
    c493a603cdbf vpn-policy-routing: downgrade to 0.2.1-13
    20a9e8700b3d python-dateutil: Add missing HOST_PYTHON3_PACKAGE_BUILD_DEPENDS
    e933f6f749aa python-importlib-metadata: Pin setuptools-scm version
    a5de193e5422 simple-adblock: update to 1.8.8-1
    af3643f9b00d https-dns-proxy: update to 2021-09-27
    f2af6941fa2b tor: update to 0.4.5.10
    746fa830c6d7 python-zipp: pin setuptools-scm version
    70bb6f15e8df perl: perlmod.mk: use flock when hostpkg/perl used
    15305d2f2ee6 nano: update to 5.9
    ece1d7bfcebf haveged: update to 1.9.15
    2d35019d6bee lighttpd: update to lighttpd 1.4.55 release hash
    b101f744c258 tcpreplay: avoid host lib leakage
    be17f9726509 tcpreplay: bump to version 4.3.4
    6e4e0d5e9dfd tcpreplay: add libdnet support
    e7167f4702b5 tcpreplay: fix compilation with Arch Linux
    668aa95dfb15 tcpreplay: bump to version 4.3.3
    6dc494fddf3b ntfs-3g: patch CVE-2019-9755
    02ce5303d5a8 nextdns: Update to version 1.37.2
    7a7b8a257b59 bind: update to version 9.16.20
    d8ef698a9fc9 cgi-io: update to latest Git HEAD
    6c5169b3956b cgi-io: update to version 2020-10-27
    daaacfd24e74 cgi-io: move into out of tree project
    d5a7aa18618c haproxy: Update HAProxy to v2.0.25
    17f5a0cc8362 python3: update to version 3.7.12
    dd6be653dd8b tor: update to version 0.4.4.9
    508c15acb77a irssi: update to 1.2.3
    93cfd1679a6f nextdns: Update to version 1.37.1
    6f3cd160d273 nextdns: Update to version 1.37.0
    72f35e712e9f acme: Fix uhttpd restart to load new certificates
    684b71f0cddc click: update to version 7.0
    5bd73795e8fc dnsdist: fix default SSL lib spelling
    1dd040f9ca89 treewide: Remove GO_PKG_LDFLAGS for stripping binaries
    82a3613ec8ad nginx: add PROVIDES nginx-ssl to nginx-all-module
    b35c3984e1fd Revert "net/miniupnpd: ext_ip_reserved_ignore support"
    72d806d18145 apr: patch CVE-2021-35940
    9d3ad065b294 nextdns: Update to version 1.36.0
    4b091361ef48 postgresql: disable PIC
    0573fb59ab33 file: update to 5.38
    b03fe54e0e98 https-dns-proxy: patch CMakeList.txt to use OpenWrt CFLAGS
    8ff2671b222e tar: fix CVE-2021-20193
    3862bb3e6d65 mc: add a missing Syntax file
    47e2ef579e90 git: update to 2.26.3
    b39f185bdf90 mc: update to 2.8.27
    865ae46492ab unixodbc: use 'install' when copying host binaries
    67f403b5e6af perl: perlmod.mk: use 'install' for host binaries
    5051c4bb0074 knot: update to version 3.0.8
    e0f5b4e2891d knot: update to version 3.0.7
    de894d37a666 knot: update to version 3.0.6
    0c3d97bf5725 knot: update to version 3.0.5
    210e3d9167be https-dns-proxy: update to 2021-07-29-01
    a0e39ca02c57 nextdns: Update to version 1.35.0
    92abb9917028 adblock: bugfix 4.0.7-9
    0872827d2dee librouteros: don't build docs
    f31271fed30f net/snort3: Include default configs and snort2lua
    de84e781e5b6 syslog-ng: update to version 3.33.2
    242dbcebafb9 yggdrasil: bump to 0.4.0
    df79c0614cbd vpnbypass: updates to 1.3.2-1
    f795536f4884 ruby: update to 2.6.8
    a673a232686b addrwatch: Various fixes
    1f9aa31eab77 addrwatch: fix broken conffiles
    531d59dbc733 addrwatch: update to 1.0.2
    ce1781155dfd addrwatch: Add missing limits header for PATH_MAX
    879838998e13 luajit: for powerpc, add FPU dependency
    be2f1b2c0041 luajit: fix compilation with host clang
    29c5a802c4d8 [LuaJIT] Allow MIPS64 support
    e5e5c889196b luajit: do not install static libraries to InstallDev
    dd627367847d luajit: use dynamic buildmode
    192aea109ad6 yggdrasil: allow HTTPS connections
    7248e1b957a5 yggdrasil: bump to 0.3.16
    fe9b2579f984 yggdrasil: bump to 0.3.15
    8687d79f8478 yggdrasil: Ygg-over-ygg bugfix
    35531bcb26a0 yggdrasil: bump to 0.3.14
    3232f272430a yggdrasil: bump to 0.3.13
    2136fafe397d yggdrasil: bump to 0.3.12
    05816dbfd83c yggdrasil: Change package configuration to UCI
    325bf6bc7540 yggdrasil: fixes build name and version #10309
    7087b16140da yggdrasil: uci firewall Section name and cover both IP versions - rename the section instance to yggdrasil (feat. request) - allow zone to cover both ip4 and ip6 fam
    56b6518c8898 yggdrasil: bump to 0.3.11
    b83f6f9af340 syslog-ng: disable mqtt
    c0e93ddff35e libuv: fix CVE-2021-22918
    39a92140d19a syslog-ng: update to version 3.33.1
    dd32c2cbeeef czmq: disable nss
    b7d2b9163cf6 apache: update to 2.4.48
    a16402770c32 czmq: update to version 4.2.1
    1cd6a5f01992 bind: update to version 9.16.18
    b86ca1563ba3 lxc: add patch to switch GPG server
    dc621a9b195f snort3: Backport stable version from 21.02
    5d189c1013a6 libdaq3: New package, dependency of snort3
    d6b64bb65368 msmtp: update to version 1.8.15
    a2ab06243970 youtube-dl: update to version 2021.4.7
    118b0cb9d608 youtube-dl: update to version 2021.2.10
    b18aab0d13f9 python3: update to version 3.7.11
    9bcac7859a80 nextdns: Update to version 1.34.2
    2294d252b3ef ddns-scripts: standardize required params declaration
    730e14da79f6 python-dateutil: pin setuptools-scm version to 5.0.2
    d1aac139a698 Revert "python-dateutil: disable setuptools-scm for build"
    29da5d65b6dc python-dateutil: disable setuptools-scm for build
    b955b6943504 nextdns: Update to version 1.33.11
    0f5fbe1f5bfd nano: update to 5.8
    ce1ae404c3a6 net/mosquitto: Update to 1.6.15
    9355f9503d17 ksmbd: update to 3.3.7
    2c328f3d8abd ksmbd: update to 3.3.6
    08d1a66e3d9f ksmbd: update to 3.3.5
    Unverified
    48f6a11e
  • Matthias Schiffer's avatar
    modules: update routing packages · ad786c78
    Matthias Schiffer authored
    8f23999365de ahcpd: use SHA256 hash and use HTTPS everywhere
    04e7f66aa770 mcproxy: Fix compilation with uClibc-ng
    bf77e5f0e026 cjdns-tests: Don't build on ARC (#487)
    01417ad6817a cjdns: Do not build on ARC
    653ec59929cc olsrd: remove empty .gitignore file
    3f095f7f7ef0 pimbd: add PKG_MIRROR_HASH
    c1a2f7a25255 oonf-olsrd2: add PKG_MIRROR_HASH
    2f9236d864ac oonf-dlep-radio: add PKG_MIRROR_HASH
    20f3e5171029 oonf-dlep-proxy: add PKG_MIRROR_HASH
    e05cb068c499 olsrd: add PKG_MIRROR_HASH
    e37cf04da41a ohybridproxy: add PKG_MIRROR_HASH, refresh patch
    95cd0ce4b5a1 mrd6: add PKG_MIRROR_HASH
    00eacef47b5e minimalist-pcproxy: add PKG_MIRROR_HASH
    84b7b3c55337 mcproxy: add PKG_MIRROR_HASH
    f17815946a1b hnetd: add PKG_MIRROR_HASH, refresh patch
    372ec6288639 cjdns: add PKG_MIRROR_HASH
    ce5adaab9520 CI: fix multi-arch-test-build for 19.07 branch
    2ed5a04ab819 CI: fix runtime testing for non master branch
    c755ab8dce1c issuetemplate: reference foreign repos
    cccff55a6288 CI: fix building multi-arch-test-build
    63625f7e1987 CI: copy .github from openwrt-packages
    df9f33c52277 batman-adv: Merge bugfixes from 2022.0
    7a3e63fd45fe batman-adv: Merge bugfixes from 2021.4
    c8734df67719 batman-adv: Refresh patches with quilt
    3c10076826a5 batman-adv: Merge bugfixes from 2021.2
    Unverified
    ad786c78
  • Matthias Schiffer's avatar
    modules: update Gluon packages · 4aa73858
    Matthias Schiffer authored
    f9ef3fc7d9d7 treewide: change Github URLs from git:// to https:// (#252)
    Unverified
    4aa73858
  • Matthias Schiffer's avatar
    Merge pull request #2401 from freifunk-gluon/v2021.1.x-update-modules · ad430d33
    Matthias Schiffer authored
    v2021.1.x: update modules
    Unverified
    ad430d33
  • Matthias Schiffer's avatar
    modules: update OpenWrt base · 7fc3fdc2
    Matthias Schiffer authored
    ecbbb373edf7 wolfssl: fix compilation with /dev/crypto
    f6e22f0956a1 OpenWrt v19.07.10: revert to branch defaults
    d03dc49943db OpenWrt v19.07.10: adjust config defaults
    9ce6aa9d8d8a wolfssl: bump to 5.2.0
    698cdf02020a mac80211: Update to version 4.19.237-1
    26a8be9c9814 kernel: generic: add missing symbol for arm64 spectre mitigation
    ae2af91edddd kernel: generic: reorder kernel config options
    058c2347c51f imagebuilder: fix broken image generation with external targets
    d39a6c67dcb4 kernel: bump 4.14 to 4.14.275
    9aa35fada652 patchelf: backport fix for rpath endianness
    Unverified
    7fc3fdc2
  • Matthias Schiffer's avatar
    modules: update OpenWrt packages · 386fd5b1
    Matthias Schiffer authored
    1c5e4c80f49b zabbix: update to version 4.0.37
    Unverified
    386fd5b1
  • Matthias Schiffer's avatar
    Merge pull request #2486 from freifunk-gluon/v2021.1.x-update-modules · cf1b5505
    Matthias Schiffer authored
    v2021.1.x: update modules
    Unverified
    cf1b5505
  • Matthias Schiffer's avatar
    Unverified
    422e20c8
  • Matthias Schiffer's avatar
    ecdsautils: verify: fix signature verification (CVE-2022-24884) · 2b5d4b88
    Matthias Schiffer authored
    A vulnerability was found in ecdsautils which allows forgery of ECDSA
    signatures. An adversary exploiting this vulnerability can create an update
    manifest accepted by the autoupdater, which can be used to distribute
    malicious firmware updates by spoofing a Gluon node's connection to the
    update server.
    Unverified
    2b5d4b88
  • Matthias Schiffer's avatar
  • Matthias Schiffer's avatar
    Update copyright years · 6ccad98f
    Matthias Schiffer authored
    Unverified
    6ccad98f
  • Matthias Schiffer's avatar
    Gluon v2021.1.2 · dcfa4522
    Matthias Schiffer authored
    Unverified
    dcfa4522
  • Matthias Schiffer's avatar
    Merge pull request from GHSA-xqhj-fmc7-f8mv · d0f43aeb
    Matthias Schiffer authored
    ecdsautils: verify: fix signature verification (CVE-2022-24884)
    Unverified
    d0f43aeb
  • Nico's avatar
    dcfc013c
  • Nico's avatar
    411c0233
  • Nico's avatar
    ath79-generic: add support for TP-Link Archer A7 v5 · 18707790
    Nico authored
    This patch was requested from a community member and has been taken from
    eulenfunk:
    https://github.com/eulenfunk/firmware/blob/2020.2.x/patches/add-TPlinkArcherA7V5.patch
    18707790
  • Nico's avatar
    ar71xx: add naive support for DIR-825 · bfce3286
    Nico authored
    bfce3286
Showing
with 405 additions and 68 deletions
The code of Project Gluon may be distributed under the following terms, unless The code of Project Gluon may be distributed under the following terms, unless
noted otherwise in individual files or subtrees. noted otherwise in individual files or subtrees.
Copyright (c) 2013-2021, Project Gluon Copyright (c) 2013-2022, Project Gluon
All rights reserved. All rights reserved.
Redistribution and use in source and binary forms, with or without Redistribution and use in source and binary forms, with or without
......
...@@ -21,7 +21,7 @@ the future development of Gluon. ...@@ -21,7 +21,7 @@ the future development of Gluon.
Please refrain from using the `master` branch for anything else but development purposes! Please refrain from using the `master` branch for anything else but development purposes!
Use the most recent release instead. You can list all releases by running `git tag` Use the most recent release instead. You can list all releases by running `git tag`
and switch to one by running `git checkout v2021.1.1 && make update`. and switch to one by running `git checkout v2021.1.2 && make update`.
If you're using the autoupdater, do not autoupdate nodes with anything but releases. If you're using the autoupdater, do not autoupdate nodes with anything but releases.
If you upgrade using random master commits the nodes *will break* eventually. If you upgrade using random master commits the nodes *will break* eventually.
......
...@@ -20,11 +20,11 @@ ...@@ -20,11 +20,11 @@
# -- Project information ----------------------------------------------------- # -- Project information -----------------------------------------------------
project = 'Gluon' project = 'Gluon'
copyright = '2015-2021, Project Gluon' copyright = '2015-2022, Project Gluon'
author = 'Project Gluon' author = 'Project Gluon'
# The short X.Y version # The short X.Y version
version = '2021.1.1' version = '2021.1.2'
# The full version, including alpha/beta/rc tags # The full version, including alpha/beta/rc tags
release = version release = version
......
...@@ -78,61 +78,7 @@ Several Freifunk communities in Germany use Gluon as the foundation of their Fre ...@@ -78,61 +78,7 @@ Several Freifunk communities in Germany use Gluon as the foundation of their Fre
:caption: Releases :caption: Releases
:maxdepth: 1 :maxdepth: 1
releases/v2021.1.1 releases/index
releases/v2021.1
releases/v2020.2.3
releases/v2020.2.2
releases/v2020.2.1
releases/v2020.2
releases/v2020.1.4
releases/v2020.1.3
releases/v2020.1.2
releases/v2020.1.1
releases/v2020.1
releases/v2019.1.3
releases/v2019.1.2
releases/v2019.1.1
releases/v2019.1
releases/v2018.2.4
releases/v2018.2.3
releases/v2018.2.2
releases/v2018.2.1
releases/v2018.2
releases/v2018.1.4
releases/v2018.1.3
releases/v2018.1.2
releases/v2018.1.1
releases/v2018.1
releases/v2017.1.8
releases/v2017.1.7
releases/v2017.1.6
releases/v2017.1.5
releases/v2017.1.4
releases/v2017.1.3
releases/v2017.1.2
releases/v2017.1.1
releases/v2017.1
releases/v2016.2.7
releases/v2016.2.6
releases/v2016.2.5
releases/v2016.2.4
releases/v2016.2.3
releases/v2016.2.2
releases/v2016.2.1
releases/v2016.2
releases/v2016.1.6
releases/v2016.1.5
releases/v2016.1.4
releases/v2016.1.3
releases/v2016.1.2
releases/v2016.1.1
releases/v2016.1
releases/v2015.1.2
releases/v2015.1.1
releases/v2015.1
releases/v2014.4
releases/v2014.3.1
releases/v2014.3
License License
------- -------
......
Release Notes
=============
.. toctree::
:caption: Gluon 2021.1
:maxdepth: 2
v2021.1.2
v2021.1.1
v2021.1
.. toctree::
:caption: Gluon 2020.2
:maxdepth: 2
v2020.2.3
v2020.2.2
v2020.2.1
v2020.2
.. toctree::
:caption: Gluon 2020.1
:maxdepth: 2
v2020.1.4
v2020.1.3
v2020.1.2
v2020.1.1
v2020.1
.. toctree::
:caption: Gluon 2019.1
:maxdepth: 2
v2019.1.3
v2019.1.2
v2019.1.1
v2019.1
.. toctree::
:caption: Gluon 2018.2
:maxdepth: 2
v2018.2.4
v2018.2.3
v2018.2.2
v2018.2.1
v2018.2
.. toctree::
:caption: Gluon 2018.1
:maxdepth: 2
v2018.1.4
v2018.1.3
v2018.1.2
v2018.1.1
v2018.1
.. toctree::
:caption: Gluon 2017.1
:maxdepth: 2
v2017.1.8
v2017.1.7
v2017.1.6
v2017.1.5
v2017.1.4
v2017.1.3
v2017.1.2
v2017.1.1
v2017.1
.. toctree::
:caption: Gluon 2016.2
:maxdepth: 2
v2016.2.7
v2016.2.6
v2016.2.5
v2016.2.4
v2016.2.3
v2016.2.2
v2016.2.1
v2016.2
.. toctree::
:caption: Gluon 2016.1
:maxdepth: 2
v2016.1.6
v2016.1.5
v2016.1.4
v2016.1.3
v2016.1.2
v2016.1.1
v2016.1
.. toctree::
:caption: Gluon 2015.1
:maxdepth: 2
v2015.1.2
v2015.1.1
v2015.1
.. toctree::
:caption: Gluon 2014.4
:maxdepth: 2
v2014.4
.. toctree::
:caption: Gluon 2014.3
:maxdepth: 2
v2014.3.1
v2014.3
Gluon 2021.1.2
==============
Important notes
---------------
This release fixes a **critical security vulnerability** in Gluon's
autoupdater.
Upgrades to v2021.1 and later releases are only supported from releases v2018.2
and later. Migration code for upgrades from older versions has been removed to
simplify maintenance.
Updates
-------
- The Linux kernel was updated to version 4.14.275
- The mac80211 wireless driver stack was updated to a version based on kernel
4.19.237
Various minor package updates are not listed here and can be found in the commit
log.
Bugfixes
--------
* **[SECURITY]** Autoupdater: Fix signature verification
A recently discovered issue (CVE-2022-24884) in the *ecdsautils* package
allows forgery of cryptographic signatures. This vulnerability can be
exploited to create a manifest accepted by the autoupdater without knowledge
of the signers' private keys. By intercepting nodes' connections to the update
server, such a manifest allows to distribute malicious firmware updates.
This is a **critical** vulnerability. All nodes with autoupdater must be
updated. Requiring multiple signatures for an update does *not* mitigate the
issue.
As a temporary workaround, the issue can be mitigated on individual nodes by
disabling the autoupdater via config mode or using the following commands::
uci set autoupdater.settings.enabled=0
uci commit autoupdater
A fixed firmware should be installed manually before enabling the autoupdater
again.
See security advisory `GHSA-qhcg-9ffp-78pw
<https://github.com/freifunk-gluon/ecdsautils/security/advisories/GHSA-qhcg-9ffp-78pw>`_
for further information on this vulnerability.
* **[SECURITY]** Config Mode: Prevent Cross-Site Request Forgery (CSRF)
The Config Mode was not validating the *Origin* header of POST requests.
This allowed arbitrary websites to modify configuration (including SSH keys)
on a Gluon node in Config Mode reachable from a user's browser by sending POST
requests with form data to 192.168.1.1.
The impact of this issue is considered low, as nodes are only vulnerable while
in Config Mode.
* Config Mode: Fix occasionally hanging page load after submitting the
configuration wizard causing the reboot message and VPN key not to be
displayed
* Config Mode (OSM): Update default OpenLayers source URL
The OSM feature of the Config Mode was broken when the default source URL was
used for OpenLayers, as the old URL has become unavailable. The default was
updated to a URL that should not become unavailable again.
* Config Mode (OSM): Fix error when using ``"`` character in attribution text
* respondd-module-airtime: Fix respondd crash on devices with disabled WLAN
interfaces
Several improvements were made to the error handling of the
*respondd-module-airtime* package. The "PHY ID" field (introduced in Gluon
2021.1) was removed again.
* ipq40xx: Fix bad WLAN performance on Plasma Cloud PA1200 and PA2200 devices
* Fix occasional build failure in "perl" package with high number of threads
(``-j32`` or higher)
Other improvements
------------------
* Several improvements were made to the status page:
- WLAN channel display does not require the *respondd-module-airtime* package
anymore
- The "gateway nexthop" label now links to the status page of the nexthop node
- The timeout to retrieve information from neighbour nodes was increased,
making the display of the name
of overloaded, slow or otherwise badly reachable nodes more likely to
succeed
Known issues
------------
* Upgrading EdgeRouter-X from versions before v2020.1.x may lead to a
soft-bricked state due to bad blocks on the NAND flash which the NAND driver
before this release does not handle well.
(`#1937 <https://github.com/freifunk-gluon/gluon/issues/1937>`_)
* The integration of the BATMAN_V routing algorithm is incomplete.
- Mesh neighbors don't appear on the status page.
(`#1726 <https://github.com/freifunk-gluon/gluon/issues/1726>`_)
Many tools have the BATMAN_IV metric hardcoded, these need to be updated to
account for the new throughput metric.
- Throughput values are not correctly acquired for different interface types.
(`#1728 <https://github.com/freifunk-gluon/gluon/issues/1728>`_)
This affects virtual interface types like bridges and VXLAN.
* Default TX power on many Ubiquiti devices is too high, correct offsets are
unknown (`#94 <https://github.com/freifunk-gluon/gluon/issues/94>`_)
Reducing the TX power in the Advanced Settings is recommended.
* In configurations without VXLAN, the MAC address of the WAN interface is
modified even when Mesh-on-WAN is disabled
(`#496 <https://github.com/freifunk-gluon/gluon/issues/496>`_)
This may lead to issues in environments where a fixed MAC address is expected
(like VMware when promiscuous mode is disallowed).
-- This is an example site configuration for Gluon v2021.1.1 -- This is an example site configuration for Gluon v2021.1.2
-- --
-- Take a look at the documentation located at -- Take a look at the documentation located at
-- https://gluon.readthedocs.io/ for details. -- https://gluon.readthedocs.io/ for details.
......
...@@ -8,7 +8,7 @@ Gluon's releases are managed using `Git tags`_. If you are just getting ...@@ -8,7 +8,7 @@ Gluon's releases are managed using `Git tags`_. If you are just getting
started with Gluon we recommend to use the latest stable release of Gluon. started with Gluon we recommend to use the latest stable release of Gluon.
Take a look at the `list of gluon releases`_ and notice the latest release, Take a look at the `list of gluon releases`_ and notice the latest release,
e.g. *v2021.1.1*. Always get Gluon using git and don't try to download it e.g. *v2021.1.2*. Always get Gluon using git and don't try to download it
as a Zip archive as the archive will be missing version information. as a Zip archive as the archive will be missing version information.
Please keep in mind that there is no "default Gluon" build; a site configuration Please keep in mind that there is no "default Gluon" build; a site configuration
...@@ -50,7 +50,7 @@ Building the images ...@@ -50,7 +50,7 @@ Building the images
------------------- -------------------
To build Gluon, first check out the repository. Replace *RELEASE* with the To build Gluon, first check out the repository. Replace *RELEASE* with the
version you'd like to checkout, e.g. *v2021.1.1*. version you'd like to checkout, e.g. *v2021.1.2*.
:: ::
......
...@@ -2,16 +2,16 @@ GLUON_FEEDS='packages routing gluon' ...@@ -2,16 +2,16 @@ GLUON_FEEDS='packages routing gluon'
OPENWRT_REPO=https://github.com/openwrt/openwrt.git OPENWRT_REPO=https://github.com/openwrt/openwrt.git
OPENWRT_BRANCH=openwrt-19.07 OPENWRT_BRANCH=openwrt-19.07
OPENWRT_COMMIT=81d0b4a9f431b2b2ca71edca91febedde98994a3 OPENWRT_COMMIT=ecbbb373edf7be017e546be2443e6c422cb9c220
PACKAGES_PACKAGES_REPO=https://github.com/openwrt/packages.git PACKAGES_PACKAGES_REPO=https://github.com/openwrt/packages.git
PACKAGES_PACKAGES_BRANCH=openwrt-19.07 PACKAGES_PACKAGES_BRANCH=openwrt-19.07
PACKAGES_PACKAGES_COMMIT=476b8b82bb7447a1ed847c96d85de567e09cdb62 PACKAGES_PACKAGES_COMMIT=1c5e4c80f49bfddaee1998636fd8efe915fee7fc
PACKAGES_ROUTING_REPO=https://github.com/openwrt/routing.git PACKAGES_ROUTING_REPO=https://github.com/openwrt/routing.git
PACKAGES_ROUTING_BRANCH=openwrt-19.07 PACKAGES_ROUTING_BRANCH=openwrt-19.07
PACKAGES_ROUTING_COMMIT=101632e153b41238bc19dfd96ba2d23339dbcb76 PACKAGES_ROUTING_COMMIT=8f23999365de1bf2617e03d3f536e4542258d985
PACKAGES_GLUON_REPO=https://github.com/freifunk-gluon/packages.git PACKAGES_GLUON_REPO=https://github.com/freifunk-gluon/packages.git
PACKAGES_GLUON_BRANCH=v2021.1.x PACKAGES_GLUON_BRANCH=v2021.1.x
PACKAGES_GLUON_COMMIT=015408e702a5843310e40c2ca664e1903b601204 PACKAGES_GLUON_COMMIT=f9ef3fc7d9d7b270de893e80cf6fba916c06bf45
...@@ -1954,10 +1954,10 @@ index 0000000000000000000000000000000000000000..92bb9275df9d54778ce8f00b1cb6e999 ...@@ -1954,10 +1954,10 @@ index 0000000000000000000000000000000000000000..92bb9275df9d54778ce8f00b1cb6e999
+2.27.0 +2.27.0
+ +
diff --git a/target/linux/generic/config-4.14 b/target/linux/generic/config-4.14 diff --git a/target/linux/generic/config-4.14 b/target/linux/generic/config-4.14
index cbe2c09af91dcbb036bb71d42b6b1075d7f31012..e7faafd719656769fe2e43ff9145abc28b806827 100644 index a0569e4eb0e1249880864563ee980fadcbcc4ac6..c672ee6ff8e7540920c48be9f0a45ed73e428c1b 100644
--- a/target/linux/generic/config-4.14 --- a/target/linux/generic/config-4.14
+++ b/target/linux/generic/config-4.14 +++ b/target/linux/generic/config-4.14
@@ -629,6 +629,7 @@ CONFIG_BRIDGE=y @@ -630,6 +630,7 @@ CONFIG_BRIDGE=y
# CONFIG_BRIDGE_EBT_T_NAT is not set # CONFIG_BRIDGE_EBT_T_NAT is not set
# CONFIG_BRIDGE_EBT_VLAN is not set # CONFIG_BRIDGE_EBT_VLAN is not set
CONFIG_BRIDGE_IGMP_SNOOPING=y CONFIG_BRIDGE_IGMP_SNOOPING=y
......
From: Nico <github@nicoboehr.de>
Date: Thu, 3 Jun 2021 20:31:55 +0000
Subject: uradvd: adjust preferred lifetime to 0
When we announce a prefix from nodes which has a preferred lifetime
of nonzero, clients can use this prefix as a source IP address.
As we announce the same prefix for every segment, this won't work. Hence,
set the preferred lifetime to 0 so nobody ever uses it as a source IP.
diff --git a/net/uradvd/src/uradvd.c b/net/uradvd/src/uradvd.c
index f6549f249518714e3d9210708b54cc23d85b26df..0edcfdcc02c3c1d513413d8cb580880e4ef9eab6 100644
--- a/net/uradvd/src/uradvd.c
+++ b/net/uradvd/src/uradvd.c
@@ -62,7 +62,7 @@
/* These are in seconds */
#define AdvValidLifetime 86400u
-#define AdvPreferredLifetime 14400u
+#define AdvPreferredLifetime 0u
#define AdvDefaultLifetime 0u
#define AdvCurHopLimit 64u
#define AdvRDNSSLifetime 1200u
From: Nico <github@nicoboehr.de>
Date: Mon, 26 Apr 2021 14:12:43 +0000
Subject: fastd: remove random delay on inital handshake
When a peer limit is defined, fastd will by default randomly delay
the inital handshake. As our gateways delay their handshake to
better distribute their load, this is undesireable.
diff --git a/net/fastd/patches/0100-remove-random-delay-on-inital-handshake.patch b/net/fastd/patches/0100-remove-random-delay-on-inital-handshake.patch
new file mode 100644
index 0000000000000000000000000000000000000000..40ca26812bda65d8b08a1034e23d1b2335c77259
--- /dev/null
+++ b/net/fastd/patches/0100-remove-random-delay-on-inital-handshake.patch
@@ -0,0 +1,23 @@
+--- a/src/peer.c
++++ b/src/peer.c
+@@ -322,19 +322,11 @@ static void reset_peer(fastd_peer_t *pee
+
+ /**
+ Starts the first handshake with a newly setup peer
+-
+- If a peer group has a peer limit the handshakes will be delayed between 0 and 3 seconds
+- make the choice of peers random (it will be biased by the latency, which might or might not be
+- what a user wants)
+ */
+ static void init_handshake(fastd_peer_t *peer) {
+- unsigned delay = 0;
+- if (has_group_config_constraints(peer->group))
+- delay = fastd_rand(0, 3000);
+-
+ peer->state = STATE_HANDSHAKE;
+
+- fastd_peer_schedule_handshake(peer, delay);
++ fastd_peer_schedule_handshake(peer, 0);
+ }
+
+ /** Handles an asynchronous DNS resolve response */
From: Matthias Schiffer <mschiffer@universe-factory.net>
Date: Wed, 27 Apr 2022 19:01:39 +0200
Subject: ecdsautils: verify: fix signature verification (CVE-2022-24884)
Signed-off-by: Matthias Schiffer <mschiffer@universe-factory.net>
diff --git a/utils/ecdsautils/Makefile b/utils/ecdsautils/Makefile
index 7f1c76f0301f56b0a88c1f6a1a0147397fde25c7..5ba893be69d40279cd6f5c9e544e941d0011f451 100644
--- a/utils/ecdsautils/Makefile
+++ b/utils/ecdsautils/Makefile
@@ -9,7 +9,7 @@ include $(TOPDIR)/rules.mk
PKG_NAME:=ecdsautils
PKG_VERSION:=0.3.2.20160630
-PKG_RELEASE:=1
+PKG_RELEASE:=2
PKG_REV:=07538893fb6c2a9539678c45f9dbbf1e4f222b46
PKG_MAINTAINER:=Matthias Schiffer <mschiffer@universe-factory.net>
PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.xz
diff --git a/utils/ecdsautils/patches/0001-verify-fix-signature-verification-CVE-2022-24884.patch b/utils/ecdsautils/patches/0001-verify-fix-signature-verification-CVE-2022-24884.patch
new file mode 100644
index 0000000000000000000000000000000000000000..34d80cc201c0e87ca654c3def4fbbbddf622b0ba
--- /dev/null
+++ b/utils/ecdsautils/patches/0001-verify-fix-signature-verification-CVE-2022-24884.patch
@@ -0,0 +1,48 @@
+From 1d4b091abdf15ad7b2312535b5b95ad70f6dbd08 Mon Sep 17 00:00:00 2001
+Message-Id: <1d4b091abdf15ad7b2312535b5b95ad70f6dbd08.1651078760.git.mschiffer@universe-factory.net>
+From: Matthias Schiffer <mschiffer@universe-factory.net>
+Date: Wed, 20 Apr 2022 22:04:07 +0200
+Subject: [PATCH] verify: fix signature verification (CVE-2022-24884)
+
+Verify that r and s are non-zero. Without these checks, an all-zero
+signature is always considered valid.
+
+While it would be nicer to error out in ecdsa_verify_prepare_legacy()
+already, that would require users of libecdsautil to check a return value
+of the prepare step. To be safe, implement the fix in an API/ABI-compatible
+way that doesn't need changes to the users.
+---
+ src/lib/ecdsa.c | 10 ++++++++++
+ 1 file changed, 10 insertions(+)
+
+diff --git a/src/lib/ecdsa.c b/src/lib/ecdsa.c
+index 8cd7722be8cd..a661b56bd7c8 100644
+--- a/src/lib/ecdsa.c
++++ b/src/lib/ecdsa.c
+@@ -135,6 +135,12 @@ regenerate:
+ void ecdsa_verify_prepare_legacy(ecdsa_verify_context_t *ctx, const ecc_int256_t *hash, const ecdsa_signature_t *signature) {
+ ecc_int256_t w, u1, tmp;
+
++ if (ecc_25519_gf_is_zero(&signature->s) || ecc_25519_gf_is_zero(&signature->r)) {
++ // Signature is invalid, mark by setting ctx->r to an invalid value
++ memset(&ctx->r, 0, sizeof(ctx->r));
++ return;
++ }
++
+ ctx->r = signature->r;
+
+ ecc_25519_gf_recip(&w, &signature->s);
+@@ -149,6 +155,10 @@ bool ecdsa_verify_legacy(const ecdsa_verify_context_t *ctx, const ecc_25519_work
+ ecc_25519_work_t s2, work;
+ ecc_int256_t w, tmp;
+
++ // Signature was detected as invalid in prepare step
++ if (ecc_25519_gf_is_zero(&ctx->r))
++ return false;
++
+ ecc_25519_scalarmult(&s2, &ctx->u2, pubkey);
+ ecc_25519_add(&work, &ctx->s1, &s2);
+ ecc_25519_store_xy_legacy(&w, NULL, &work);
+--
+2.36.0
+
...@@ -103,6 +103,10 @@ device('d-link-dir-825-rev-b1', 'dir-825-b1', { ...@@ -103,6 +103,10 @@ device('d-link-dir-825-rev-b1', 'dir-825-b1', {
class = 'tiny', -- Only 6M of usable Firmware space class = 'tiny', -- Only 6M of usable Firmware space
}) })
device('d-link-dir-825-rev-c1', 'dir-825-c1', {
profile = 'DIR825C1'
})
-- GL.iNet -- GL.iNet
......
...@@ -95,6 +95,10 @@ device('tp-link-archer-c2-v3', 'tplink_archer-c2-v3', { ...@@ -95,6 +95,10 @@ device('tp-link-archer-c2-v3', 'tplink_archer-c2-v3', {
}) })
device('tp-link-archer-a7-v5', 'tplink_archer-a7-v5', {
packages = ATH10K_PACKAGES_QCA9888,
})
device('tp-link-archer-c6-v2', 'tplink_archer-c6-v2', { device('tp-link-archer-c6-v2', 'tplink_archer-c6-v2', {
packages = ATH10K_PACKAGES_QCA9888, packages = ATH10K_PACKAGES_QCA9888,
}) })
......