OpenWrt v21.02.7 Changelog
This changelog lists all commits done in OpenWrt since the v21.02.6 tag, grouped by subsystem. The changes are chronologically ordered from top to bottom and cover the Git repository history until the tagging of the 21.02.7 release.
See also the release notes that provide a more accessible overview of the main changes in 21.02.6.
Kernel (1 change)
34d2883
kernel: backport fix for recently introduced UBI bug (+71,-2)
Packages / Common (1 change)
f8282da
openssl: fix CVE-2023-464 and CVE-2023-465 (+263,-1)
Packages / OpenWrt network userland (1 change)
e63b844
uclient: update to Git version 2023-04-13 (+3,-3)
⇒ dc54d2b
tests: add certificate check against letsencrypt.org (+4)
⇒ 644d3c7
ci: improve wolfSSL test coverage (+53,-7)
⇒ 007d945
uclient: cancel state change timeout in uclient_disconnect() (+1)
Addressed bugs
#12232
Description: snapshot builds do not install correctly - Mar 2023 builds
Link: https://github.com/openwrt/openwrt/issues/12232
Commits:
34d2883
kernel: backport fix for recently introduced UBI bug (+71,-2)
Security fixes
CVE-2023-0464
Description: A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0464
Commits:
f8282da
openssl: fix CVE-2023-464 and CVE-2023-465 (+263,-1)
CVE-2023-0465
Description: Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0465
Commits:
f8282da
openssl: fix CVE-2023-464 and CVE-2023-465 (+263,-1)