Commit Graph

3703 Commits (arm-ng)
 

Author SHA1 Message Date
pedro 2dd42c6520 router: rc: nginx.c: some corrections, clean-up 6 years ago
pedro f2974d3b5c php: update to 7.2.27 6 years ago
pedro 7da5255589 nginx: update to 1.17.8 6 years ago
pedro a1f3af3535 gmp: update to 6.2.0 6 years ago
pedro fc93eeb007 router: rc: services.c: add warning to syslog when dnsmasq is skipped because of WEB mode enabled 6 years ago
pedro f69c96ac82 Merge branch 'arm-master' into arm-ng 6 years ago
pedro c3be5786a1 router: mdu: Makefile: build openssl11 with pthread 6 years ago
pedro 3a61559acd GUI: Admin Access: delete the unnecessary http_root variable (Allow web login as "root") - now the username is 'root' if it's not entered, no need to check/uncheck something 6 years ago
pedro 766c05eb44 GUI: Admin Access: fix info about default web username 6 years ago
pedro 914730a960 router: httpd: misc.c: change memory format specifiers to unsigned integer, fixes #9
- there was an overflow in displaying memory sizes above 2GB
6 years ago
pedro d976879e0e router: others: secure adblock with lock file; cosmetic in Makefile 6 years ago
Alessandro Radicati e5447fc04c GUI: Fix Issue #15 to allow configuring remote access in router mode 6 years ago
pedro 94908faefd Merge branch 'arm-master' into arm-ng 6 years ago
pedro b30029f19d router: www: status-overview.asp: add missing 10Mb port icons, add set of half-duplex icons, code optimization/reduce size, clean-up 6 years ago
pedro 7c6d81b5be router: Makefile: transmission: fix compiler warnings (partially); don't build utils/cli; clean-up recipe 6 years ago
M_ars a38330c2c1 kernel: netfilter: nf_ct_ipv4: packets with wrong ihl are invalid It was reported that the Linux kernel sometimes logs:
klogd: [2629147.402413] kernel BUG at net / netfilter /
nf_conntrack_proto_tcp.c: 447!
klogd: [1072212.887368] kernel BUG at net / netfilter /
nf_conntrack_proto_tcp.c: 392

ipv4_get_l4proto() in nf_conntrack_l3proto_ipv4.c and tcp_error() in
nf_conntrack_proto_tcp.c should catch malformed packets, so the errors
at the indicated lines - TCP options parsing - should not happen.
However, tcp_error() relies on the "dataoff" offset to the TCP header,
calculated by ipv4_get_l4proto().  But ipv4_get_l4proto() does not check
bogus ihl values in IPv4 packets, which then can slip through tcp_error()
and get caught at the TCP options parsing routines.

The patch fixes ipv4_get_l4proto() by invalidating packets with bogus
ihl value.

The patch closes netfilter bugzilla id 771.

Signed-off-by: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c?h=v4.10&id=07153c6ec074257ade76a461429b567cff2b3a1e
6 years ago
M_ars b8a4d3c1fa kernel: netfilter: nf_ct_ipv4: handle invalid IPv4 and IPv6 packets consistently IPv6 conntrack marked invalid packets as INVALID and let the user drop those by an explicit rule, while IPv4 conntrack dropped such packets itself.
IPv4 conntrack is changed so that it marks INVALID packets and let
the user to drop them.

Signed-off-by: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c?h=v4.10&id=8430eac2f6a3c2adce22d490e2ab8bb50d59077a
6 years ago
M_ars f580948651 kernel: net: don't call strlen() on the user buffer in packet_bind_spkt() KMSAN (KernelMemorySanitizer, a new error detection tool) reports use of uninitialized memory in packet_bind_spkt(): Acked-by: Eric Dumazet <edumazet@google.com>
==================================================================
BUG: KMSAN: use of unitialized memory
CPU: 0 PID: 1074 Comm: packet Not tainted 4.8.0-rc6+ #1891
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs
01/01/2011
 0000000000000000 ffff88006b6dfc08 ffffffff82559ae8 ffff88006b6dfb48
 ffffffff818a7c91 ffffffff85b9c870 0000000000000092 ffffffff85b9c550
 0000000000000000 0000000000000092 00000000ec400911 0000000000000002
Call Trace:
 [<     inline     >] __dump_stack lib/dump_stack.c:15
 [<ffffffff82559ae8>] dump_stack+0x238/0x290 lib/dump_stack.c:51
 [<ffffffff818a6626>] kmsan_report+0x276/0x2e0 mm/kmsan/kmsan.c:1003
 [<ffffffff818a783b>] __msan_warning+0x5b/0xb0
mm/kmsan/kmsan_instr.c:424
 [<     inline     >] strlen lib/string.c:484
 [<ffffffff8259b58d>] strlcpy+0x9d/0x200 lib/string.c:144
 [<ffffffff84b2eca4>] packet_bind_spkt+0x144/0x230
net/packet/af_packet.c:3132
 [<ffffffff84242e4d>] SYSC_bind+0x40d/0x5f0 net/socket.c:1370
 [<ffffffff84242a22>] SyS_bind+0x82/0xa0 net/socket.c:1356
 [<ffffffff8515991b>] entry_SYSCALL_64_fastpath+0x13/0x8f
arch/x86/entry/entry_64.o:?
chained origin: 00000000eba00911
 [<ffffffff810bb787>] save_stack_trace+0x27/0x50
arch/x86/kernel/stacktrace.c:67
 [<     inline     >] kmsan_save_stack_with_flags mm/kmsan/kmsan.c:322
 [<     inline     >] kmsan_save_stack mm/kmsan/kmsan.c:334
 [<ffffffff818a59f8>] kmsan_internal_chain_origin+0x118/0x1e0
mm/kmsan/kmsan.c:527
 [<ffffffff818a7773>] __msan_set_alloca_origin4+0xc3/0x130
mm/kmsan/kmsan_instr.c:380
 [<ffffffff84242b69>] SYSC_bind+0x129/0x5f0 net/socket.c:1356
 [<ffffffff84242a22>] SyS_bind+0x82/0xa0 net/socket.c:1356
 [<ffffffff8515991b>] entry_SYSCALL_64_fastpath+0x13/0x8f
arch/x86/entry/entry_64.o:?
origin description: ----address@SYSC_bind (origin=00000000eb400911)
==================================================================
(the line numbers are relative to 4.8-rc6, but the bug persists
upstream)

, when I run the following program as root:

=====================================
 #include <string.h>
 #include <sys/socket.h>
 #include <netpacket/packet.h>
 #include <net/ethernet.h>

 int main() {
   struct sockaddr addr;
   memset(&addr, 0xff, sizeof(addr));
   addr.sa_family = AF_PACKET;
   int fd = socket(PF_PACKET, SOCK_PACKET, htons(ETH_P_ALL));
   bind(fd, &addr, sizeof(addr));
   return 0;
 }
=====================================

This happens because addr.sa_data copied from the userspace is not
zero-terminated, and copying it with strlcpy() in packet_bind_spkt()
results in calling strlen() on the kernel copy of that non-terminated
buffer.

Signed-off-by: Alexander Potapenko <glider@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/packet/af_packet.c?h=v5.5&id=540e2894f7905538740aaf122bd8e0548e1c34a4
6 years ago
M_ars c83b241387 kernel: ipv6: Allow IPv4-mapped address as next-hop Made kernel accept IPv6 routes with IPv4-mapped address as next-hop.
It is possible to configure IP interfaces with IPv4-mapped addresses, and
one can add IPv6 routes for IPv4-mapped destinations/prefixes, yet prior
to this fix the kernel returned an EINVAL when attempting to add an IPv6
route with an IPv4-mapped address as a nexthop/gateway.

RFC 4798 (a proposed standard RFC) uses IPv4-mapped addresses as nexthops,
thus in order to support that type of address configuration the kernel
needs to allow IPv4-mapped addresses as nexthops.

Signed-off-by: Erik Nordmark <nordmark@arista.com>
Signed-off-by: Bob Gilligan <gilligan@arista.com>
Signed-off-by: David S. Miller <davem@davemloft.net>

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.5&id=96d5822c1d812ed30da035795a4408f43fe533f3
6 years ago
M_ars 8dc6bbcc29 kernel: ipv6: do not increment mac header when it's unset Otherwise we'll overflow the integer. This occurs when layer 3 tunneled packets are handed off to the IPv6 layer.
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
Signed-off-by: David S. Miller <davem@davemloft.net>

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/reassembly.c?h=v5.5&id=b678aa578c9e400429e027269e8de2783e5e73ce
6 years ago
M_ars b4e6eb740d kernel: tcp: avoid infinite loop in tcp_splice_read() Splicing from TCP socket is vulnerable when a packet with URG flag is received and stored into receive queue.
__tcp_splice_read() returns 0, and sk_wait_data() immediately
returns since there is the problematic skb in queue.

This is a nice way to burn cpu (aka infinite loop) and trigger
soft lockups.

Again, this gem was found by syzkaller tool.

Fixes: 9c55e01c0cc8 ("[TCP]: Splice receive support.")
Signed-off-by: Eric Dumazet <edumazet@google.com>
Reported-by: Dmitry Vyukov  <dvyukov@google.com>
Cc: Willy Tarreau <w@1wt.eu>
Signed-off-by: David S. Miller <davem@davemloft.net>

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/tcp.c?h=v5.5&id=ccf7abb93af09ad0868ae9033d1ca8108bdaec82
6 years ago
M_ars aa2f3eed6b Update README.md: add support for Asus RT-AC68U B2 (only cosmetic) 6 years ago
pedro 472623287b router: Makefile: samba3: build with libiconv if available 6 years ago
pedro 10256a7beb router: Makefile: fix xl2tpd-clean recipe 6 years ago
pedro e81323ced4 router: Makefile: fix dnsmasq-clean recipe 6 years ago
pedro 7dfa1d78ac router: Makefile: clean-up php recipe 6 years ago
pedro 9f082de8e0 router: rc: misc.c: clean-up 6 years ago
pedro 9d4d0d6b2f router: rc: nocat.c: optimize code, clean-up 6 years ago
pedro 499eac7ccb router: rc: restrict.c: clean-up 6 years ago
pedro 0149b71d0e router: rc: snmp.c: optimize code, clean-up 6 years ago
pedro 7a6643f40d router: rc: tinc.c: optimize code, clean-up 6 years ago
pedro 601d9aed3e router: rc: transmission.c: optimize code, clean-up 6 years ago
pedro 7ef479643d router: rc: mysql.c: optimize code, clean-up 6 years ago
M_ars f62c145031 Add Asus RT-AC68U B2 support (almost the same like AC1900P)
THX to user steveineastie from linksysinfo.org

Detection Infos:
boardtype=0x072F
boardrev=0x1500
boardnum=00
boardflags=0x00000110
boardflags2=0x00000000
odmpid=RT-AC68U
model=RT-AC68U
cpurev=c0
6 years ago
pedro 0fce047fd6 router: Makefile: always build and install zlib 6 years ago
pedro ad10bfb6fe router: Makefile: remove FULL_OPENSSL var 6 years ago
pedro d4e637f3f4 router: Makefile: there is no libyaml to install 6 years ago
pedro 5c05f552ce libcurl: update CA certificate bundle as of 2020-01-01 6 years ago
pedro e9e3e3d072 router: Makefile: fix some configure/compiler warnings, clean-up 6 years ago
pedro 81bd842541 router: mssl: add debug log, clean-up 6 years ago
pedro 071c15ad89 router: Makefile: clean-up; remove unused scsi-idle package from the tree 6 years ago
pedro a283aec7b9 GUI: TOR: add an option to resolve only .onion/.exit domains without having to configure anything else 6 years ago
pedro 6a55273ab4 router: www: vpn-tinc.asp: fix some bugs, add link to the tutorial, clean-up 6 years ago
pedro 9350fef7b2 Bump version to 2020.2 6 years ago
pedro 51f6763e96 Merge branch 'arm-master' into arm-ng 6 years ago
pedro 94cfe99369 Update CHANGELOG 6 years ago
pedro 382ae15a56 Merge branch 'arm-master' into arm-ng 6 years ago
pedro 8580341d58 libcurl: update to 7.68.0
- remove the patch that is no longer needed
- changes in router/Makefile - avoid configure warning
6 years ago
pedro 3d48b6ed1e dnsmasq: update to ab53883 (2020.01.11) snapshot
- cosmetic in patch
6 years ago
pedro a23fe7b938 e2fsprogs: update to 1.45.5 6 years ago