OpenWrt 22.03.3 - Service Release - 9 January 2023
_______ ________ __
| |.-----.-----.-----.| | | |.----.| |_
| - || _ | -__| || | | || _|| _|
|_______|| __|_____|__|__||________||__| |____|
|__| W I R E L E S S F R E E D O M
-----------------------------------------------------
OpenWrt 22.03.3, r20028-43d71ad93e
-----------------------------------------------------
The OpenWrt community is proud to announce the newest stable release of the
OpenWrt 22.03 stable version series. It fixes security issues, improves device support, and brings a few bug fixes.
Download firmware images via the Firmware Selector or directly from our download servers:
An upgrade from OpenWrt 21.02 or 22.03 to OpenWrt 22.03.3 is supported in many cases with the help of the sysupgrade utility which will also attempt to preserve the configuration. A configuration backup is advised nonetheless when upgrading to OpenWrt 22.03. (see “Upgrading” below).
About OpenWrt
The OpenWrt Project is a Linux operating system targeting embedded devices.
It is a complete replacement for the vendor-supplied firmware of a wide range
of wireless routers and non-network devices. See the
Table of Hardware for supported devices.
For more information about OpenWrt project organization, see the
About OpenWrt pages.
Announcements about new releases and security fixes
Do you want to be informed about important changes such as new releases and security fixes?
We have a new mailing list for this, as well as RSS options: see Important changes and announcements.
Main changes between OpenWrt 22.03.2 and OpenWrt 22.03.3
Only the main changes are listed below. See changelog-22.03.3 for the full changelog.
Security fixes
CVE-2022-30065: busybox: Fix a use-after-free in Busybox 1.35-x's awk applet
CVE-2022-0934: dnsmasq: Fixes single-byte, non-arbitrary write/use-after-free flaw in dnsmasq DHCPv6 server
CVE-2022-1304: e2fsprogs: An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5
CVE-2022-47939: kmod-ksmbd: ZDI-22-1690: Linux Kernel ksmbd Use-After-Free Remote Code Execution Vulnerability
CVE-2022-46393: mbedtls: Fix potential heap buffer overread and overwrite
CVE-2022-46392: mbedtls: An adversary with access to precise enough information about memory accesses can recover an RSA private key
CVE 2022-42905: wolfssl: In the case that the WOLFSSL_CALLBACKS macro is set when building wolfSSL, there is a potential heap over read of 5 bytes when handling
TLS 1.3 client connections.
Device support
Support for the following devices was added:
Ruckus ZoneFlex 7372
Ruckus ZoneFlex 7321
ZTE MF289F
TrendNet TEW-673GRU
Linksys EA4500 v3
Wavlink WS-WN572HP3 4G
Fix reboot loop by using LZMA loader. This affects the following devices:
NETGEAR EX6150
HiWiFi HC5962
ASUS RT-N56U B1
Belkin F9K1109v1
D-Link DIR-645
D-Link DIR-860L B1
NETIS WF2881
ZyXEL WAP6805
Fix
WAN mac address assignment. This affects the following devices:
UniElec U7621-01
UniElec U7621-06
TP-Link AR7241
TP-Link TL-WR740N
TP-Link TL-WR741ND v4
Teltonika RUT230
Luma Home WRTQ-329ACN
mvebu: Disable devices using broken mv88e6176 switch. This affects the following devices (See
broken_mv88e6176_switch):
CZ.NIC Turris Omnia
Linksys WRT1200AC
Linksys WRT1900ACS
Linksys WRT1900AC v1
Linksys WRT1900AC v2
Linksys WRT3200ACM
Linksys WRT32X
Linksys WRT3200ACM
SolidRun ClearFog Pro
lantiq/xrx200: Enable interrupts on second VPE
layerscape: Fix SPI-NOR issues with vendor patches
RouterBoard 912UAG: Fix reference clock
TP-Link RE200 v3/v4: Fix LED configuration
GL.iNet GL-MT1300: Fix flash access by reducing SPI clock
Youku YK-L2 and YK-L1: Allow installing initramfs-kernel.bin over vendor web UI
D-Link DIR-825 B1: Add factory image recipe
D-Link DIR-825-B1: Expand rootfs
D-Link DGS-1210-10P: Add support for extra buttons and LEDs
Asus RT-AC88U: Include Broadcom 4366b1 firmware by default
AVM FRITZ!Box 7430: Include USB driver by default
HAOYU Electronics MarsBoard A10: Include sound driver by default
Linksys EA6350v3, EA8300, MR8300 and WHW01: Allow flashing Linksys factory firmware
Various fixes and improvements
firewall4: Fix boot hang with firewall4 and loadfile
Added the following kernel packages:
kmod-sched-prio (extracted from kmod-sched)
kmod-sched-red (extracted from kmod-sched)
kmod-sched-act-police (extracted from kmod-sched)
kmod-sched-act-ipt (extracted from kmod-sched)
kmod-sched-pie (extracted from kmod-sched)
kmod-sched-drr
kmod-sched-fq-pie
kmod-sched-act-sample
kmod-nvme
kmod-phy-marvell
kmod-hwmon-sht3x
kmod-netconsole
kmod-btsdio
Added firmware files for mt7916 and mt7921 devices
hostapd: Remove dtim_period option from device, it is already a BSS property
procd: Service: pass all arguments to service
ustream-openssl: Disable renegotiation in TLSv1.2 and earlier
comgt-ncm: Add support for quectel modem EC200T-EU
umbim: Allow roaming and partner connections
kernel: Add support for EON EN25QX128A spi nor flash
iwinfo: Many bugfixes and improvements:
improvements in showing the used band, ht mode and hw mode
Added support for HE (Wifi 6) modes
Added support for new devices (MT7921AU, MT7986 WiSoC)
Add support for CCMP-256 and GCMP-256 ciphers
uhttpd: Fix incorrectly emitting
HTTP 413 for certain content lengths
gcc: Import patch fixing asm machine directive for powerpc
Core components update
Update Linux kernel from 5.10.146 to 5.10.161
Update mac80211 backports from 5.15.58-1 to 5.15.81-1
Update strace from 5.16 to 5.19
Update mbedtls from 2.28.1 to 2.28.2
Update openssl from 1.1.1q to 1.1.1s
Update wolfssl from 5.5.1 to 5.5.4
Update util-linux from 2.37.3 to 2.37.4
Update firewall4 from 2022-10-14 to 2022-10-18
Update odhcpd from 2022-03-22 to 2023-01-02
Update uhttpd from 2022-08-12 to 2022-10-31
Update iwinfo from 2022-08-19 to 2022-12-15
Update ucode from 2022-10-07 to 2022-12-02
Upgrading to 22.03.3
Sysupgrade can be used to upgrade a device from OpenWrt 21.02 or 22.03 to 22.03.3 and configuration will be preserved in most cases.
Sysupgrade from 19.07 to 22.03 is not supported.
There is no migration path for targets that switched from swconfig to DSA. In that case, sysupgrade will refuse to proceed with an appropriate error message:
Image version mismatch. image 1.1 device 1.0 Please wipe config during upgrade (force required) or reinstall. Config cannot be migrated from swconfig to DSA Image check failed
Known issues
Broken MV88E6176 switch
Devices featuring the MV88E6176 integrated switch are currently broken in 22.03: the switch behaves as a hub, meaning network packets will be sent to all ports.
This bug is documented in (FS#11077). This problem is only seen with kernel 5.10. OpenWrt 21.02 and OpenWrt master are not affected.