Table of Contents

LEDE v17.01.4 Changelog

This changelog lists all commits done in LEDE since the v17.01.3 tag, grouped by subsystem. The changes are chronologically ordered from top to bottom and cover the Git repository history until the tagging of the final 17.01.4 release.

Build System / Buildroot (2 changes)

2ce9c84 build: add a darwin sitefile to deal with macOS 10.12 + Xcode 9 build errors (+7)
444add1 LEDE v17.01.4: adjust config defaults (+11,-9)

Build System / Feeds (1 change)

444add1 LEDE v17.01.4: adjust config defaults (+11,-9)

Build System / Host Utilities (1 change)

0672213 cmake: fix build error with Xcode 9 on macOS 12 (+15)

Build System / Toolchain (2 changes)

a999f91 gcc: fix build error with macOS + Xcode 9 (+10)
f67c22e toolchain/gdb: update to version 8.0.1 (+5,-5)

Kernel (2 changes)

8ad1b09 kernel: add fix for bgmac with B50212E B1 PHY (+98,-3)
fa0b5fc kernel: bump 4.4 to 4.4.92 (+12,-12)

Packages / Common (5 changes)

63c1714 hostapd: merge fixes for WPA packet number reuse with replayed messages and k... (+929,-10)
907d870 wireguard: add wireguard to base packages (+308)
b6c3931 hostapd: backport extra changes related to KRACK (+730)
d501786 hostapd: add wpa_disable_eapol_key_retries option (+6,-1)
79f57e4 wireguard: version bump to 0.0.20171017 (+2,-2)

Packages / LEDE base files (1 change)

444add1 LEDE v17.01.4: adjust config defaults (+11,-9)

Target / ar71xx (1 change)

94aa2b8 ar71xx: add rssileds to WA850RE v1 image (+1)

Target / bcm53xx (1 change)

baa8eaa bcm53xx: backport DTS changes up to the first 4.15 queued commits (+662)

Target / brcm2708 (1 change)

fa0b5fc kernel: bump 4.4 to 4.4.92 (+12,-12)

Target / cns3xxx (1 change)

fa0b5fc kernel: bump 4.4 to 4.4.92 (+12,-12)

Target / oxnas (1 change)

fa0b5fc kernel: bump 4.4 to 4.4.92 (+12,-12)

Target / ramips (4 changes)

f9a849c ramips: mt7620: do not pad sysupgrade Archer images (+3,-3)
c1023c8 mt76: sync with version 878456caf60d from master (+38,-52)
2e9f3c6 ramips: fix typo in MT7621 NAND driver (+1,-1)
e6fd17d ramips: fix compile warning in MT7621 NAND driver (+1,-1)

Target / x86 (5 changes)

f52b404 x86/generic: use HIGHMEM64G instead of HIGHMEM4G to fix PAE and Xen (+4,-1)
da0219e x86: Fix xen serial console by removing conflicting PATA driver (-2)
cabf775 x86: Refresh subtargets kernel config (+16,-14)
cdd093b x86/64: add xen DomU support (+58,-1)
46e29bd x86: partly revert cabf775 (+12,-1)

Wireless / Common (3 changes)

bff1630 brcmfmac: backport length check in brcmf_cfg80211_escan_handler() (+63)
707305a mac80211: Update wireless-regdb to master-2017-03-07 (+19,-12)
a5e1f7f mac80211: backport kernel fix for CVE-2017-13080 (+81)

Wireless / MT76 (1 change)

c1023c8 mt76: sync with version 878456caf60d from master (+38,-52)

Addressed bugs

#787

Description: no console in Xen-DomU guests
Link: https://bugs.lede-project.org/index.php?do=details&task_id=787
Commits:
da0219e x86: Fix xen serial console by removing conflicting PATA driver (-2)

#908

Description: x86: Xen support broken in 17.01.2 and later
Link: https://bugs.lede-project.org/index.php?do=details&task_id=908
Commits:
f52b404 x86/generic: use HIGHMEM64G instead of HIGHMEM4G to fix PAE and Xen (+4,-1)

#1025

Description: lede-17.01.2-ramips-mt7620-ArcherC50-squashfs-sysupgrade.bin does not fit on device
Link: https://bugs.lede-project.org/index.php?do=details&task_id=1025
Commits:
f9a849c ramips: mt7620: do not pad sysupgrade Archer images (+3,-3)

#1039

Description: lede-17.01.3-ramips-mt7620-ArcherC50-squashfs-sysupgrade.bin wont fit (7.63 Mb - 7.62 left)
Link: https://bugs.lede-project.org/index.php?do=details&task_id=1039
Commits:
f9a849c ramips: mt7620: do not pad sysupgrade Archer images (+3,-3)

#1043

Description: WA850RE v1 leds
Link: https://bugs.lede-project.org/index.php?do=details&task_id=1043
Commits:
94aa2b8 ar71xx: add rssileds to WA850RE v1 image (+1)

Security fixes

CVE-2017-0786

Description: A elevation of privilege vulnerability in the Broadcom wi-fi driver. Product: Android. Versions: Android kernel. Android ID: A-37351060. References: B-V2017060101.

Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0786
Commits:
bff1630 brcmfmac: backport length check in brcmf_cfg80211_escan_handler() (+63)

CVE-2017-9778

Description: GNU Debugger (GDB) 8.0 and earlier fails to detect a negative length field in a DWARF section. A malformed section in an ELF binary or a core file can cause GDB to repeatedly allocate memory until a process limit is reached. This can, for example, impede efforts to analyze malware with GDB.

Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9778
Commits:
f67c22e toolchain/gdb: update to version 8.0.1 (+5,-5)

CVE-2017-12153

Description: A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.

Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12153
Commits:
fa0b5fc kernel: bump 4.4 to 4.4.92 (+12,-12)

CVE-2017-12154

Description: The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the Linux kernel through 4.13.3 does not ensure that the "CR8-load exiting" and "CR8-store exiting" L0 vmcs02 controls exist in cases where L1 omits the "use TPR shadow" vmcs12 control, which allows KVM L2 guest OS users to obtain read and write access to the hardware CR8 register.

Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12154
Commits:
fa0b5fc kernel: bump 4.4 to 4.4.92 (+12,-12)

CVE-2017-13077

Description: Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13077
Commits:
63c1714 hostapd: merge fixes for WPA packet number reuse with replayed messages and k... (+929,-10)

CVE-2017-13078

Description: Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.

Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13078
Commits:
63c1714 hostapd: merge fixes for WPA packet number reuse with replayed messages and k... (+929,-10)

CVE-2017-13079

Description: Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.

Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13079
Commits:
63c1714 hostapd: merge fixes for WPA packet number reuse with replayed messages and k... (+929,-10)

CVE-2017-13080

Description: Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.

Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080
Commits:
63c1714 hostapd: merge fixes for WPA packet number reuse with replayed messages and k... (+929,-10)
a5e1f7f mac80211: backport kernel fix for CVE-2017-13080 (+81)

CVE-2017-13081

Description: Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.

Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13081
Commits:
63c1714 hostapd: merge fixes for WPA packet number reuse with replayed messages and k... (+929,-10)

CVE-2017-13082

Description: Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13082
Commits:
63c1714 hostapd: merge fixes for WPA packet number reuse with replayed messages and k... (+929,-10)

CVE-2017-13086

Description: Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13086
Commits:
63c1714 hostapd: merge fixes for WPA packet number reuse with replayed messages and k... (+929,-10)

CVE-2017-13087

Description: Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.

Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087
Commits:
63c1714 hostapd: merge fixes for WPA packet number reuse with replayed messages and k... (+929,-10)

CVE-2017-13088

Description: Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.

Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13088
Commits:
63c1714 hostapd: merge fixes for WPA packet number reuse with replayed messages and k... (+929,-10)

CVE-2017-1000252

Description: The KVM subsystem in the Linux kernel through 4.13.3 allows guest OS users to cause a denial of service (assertion failure, and hypervisor hang or crash) via an out-of bounds guest_irq value, related to arch/x86/kvm/vmx.c and virt/kvm/eventfd.c.

Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000252
Commits:
fa0b5fc kernel: bump 4.4 to 4.4.92 (+12,-12)