This changelog lists all commits done in LEDE since the v17.01.3 tag, grouped by subsystem. The changes are chronologically ordered from top to bottom and cover the Git repository history until the tagging of the final 17.01.4 release.
2ce9c84
build: add a darwin sitefile to deal with macOS 10.12 + Xcode 9 build errors (+7)
444add1
LEDE v17.01.4: adjust config defaults (+11,-9)
444add1
LEDE v17.01.4: adjust config defaults (+11,-9)
0672213
cmake: fix build error with Xcode 9 on macOS 12 (+15)
a999f91
gcc: fix build error with macOS + Xcode 9 (+10)
f67c22e
toolchain/gdb: update to version 8.0.1 (+5,-5)
8ad1b09
kernel: add fix for bgmac with B50212E B1 PHY (+98,-3)
fa0b5fc
kernel: bump 4.4 to 4.4.92 (+12,-12)
63c1714
hostapd: merge fixes for WPA packet number reuse with replayed messages and k... (+929,-10)
907d870
wireguard: add wireguard to base packages (+308)
b6c3931
hostapd: backport extra changes related to KRACK (+730)
d501786
hostapd: add wpa_disable_eapol_key_retries option (+6,-1)
79f57e4
wireguard: version bump to 0.0.20171017 (+2,-2)
444add1
LEDE v17.01.4: adjust config defaults (+11,-9)
94aa2b8
ar71xx: add rssileds to WA850RE v1 image (+1)
baa8eaa
bcm53xx: backport DTS changes up to the first 4.15 queued commits (+662)
fa0b5fc
kernel: bump 4.4 to 4.4.92 (+12,-12)
fa0b5fc
kernel: bump 4.4 to 4.4.92 (+12,-12)
fa0b5fc
kernel: bump 4.4 to 4.4.92 (+12,-12)
f9a849c
ramips: mt7620: do not pad sysupgrade Archer images (+3,-3)
c1023c8
mt76: sync with version 878456caf60d from master (+38,-52)
2e9f3c6
ramips: fix typo in MT7621 NAND driver (+1,-1)
e6fd17d
ramips: fix compile warning in MT7621 NAND driver (+1,-1)
f52b404
x86/generic: use HIGHMEM64G instead of HIGHMEM4G to fix PAE and Xen (+4,-1)
da0219e
x86: Fix xen serial console by removing conflicting PATA driver (-2)
cabf775
x86: Refresh subtargets kernel config (+16,-14)
cdd093b
x86/64: add xen DomU support (+58,-1)
46e29bd
x86: partly revert cabf775 (+12,-1)
bff1630
brcmfmac: backport length check in brcmf_cfg80211_escan_handler() (+63)
707305a
mac80211: Update wireless-regdb to master-2017-03-07 (+19,-12)
a5e1f7f
mac80211: backport kernel fix for CVE-2017-13080 (+81)
c1023c8
mt76: sync with version 878456caf60d from master (+38,-52)
Description: no console in Xen-DomU guests
Link: https://bugs.lede-project.org/index.php?do=details&task_id=787
Commits:
da0219e
x86: Fix xen serial console by removing conflicting PATA driver (-2)
Description: x86: Xen support broken in 17.01.2 and later
Link: https://bugs.lede-project.org/index.php?do=details&task_id=908
Commits:
f52b404
x86/generic: use HIGHMEM64G instead of HIGHMEM4G to fix PAE and Xen (+4,-1)
Description: lede-17.01.2-ramips-mt7620-ArcherC50-squashfs-sysupgrade.bin does not fit on device
Link: https://bugs.lede-project.org/index.php?do=details&task_id=1025
Commits:
f9a849c
ramips: mt7620: do not pad sysupgrade Archer images (+3,-3)
Description: lede-17.01.3-ramips-mt7620-ArcherC50-squashfs-sysupgrade.bin wont fit (7.63 Mb - 7.62 left)
Link: https://bugs.lede-project.org/index.php?do=details&task_id=1039
Commits:
f9a849c
ramips: mt7620: do not pad sysupgrade Archer images (+3,-3)
Description: WA850RE v1 leds
Link: https://bugs.lede-project.org/index.php?do=details&task_id=1043
Commits:
94aa2b8
ar71xx: add rssileds to WA850RE v1 image (+1)
Description: A elevation of privilege vulnerability in the Broadcom wi-fi driver. Product: Android. Versions: Android kernel. Android ID: A-37351060. References: B-V2017060101.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0786
Commits:
bff1630
brcmfmac: backport length check in brcmf_cfg80211_escan_handler() (+63)
Description: GNU Debugger (GDB) 8.0 and earlier fails to detect a negative length field in a DWARF section. A malformed section in an ELF binary or a core file can cause GDB to repeatedly allocate memory until a process limit is reached. This can, for example, impede efforts to analyze malware with GDB.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9778
Commits:
f67c22e
toolchain/gdb: update to version 8.0.1 (+5,-5)
Description: A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12153
Commits:
fa0b5fc
kernel: bump 4.4 to 4.4.92 (+12,-12)
Description: The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the Linux kernel through 4.13.3 does not ensure that the "CR8-load exiting" and "CR8-store exiting" L0 vmcs02 controls exist in cases where L1 omits the "use TPR shadow" vmcs12 control, which allows KVM L2 guest OS users to obtain read and write access to the hardware CR8 register.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12154
Commits:
fa0b5fc
kernel: bump 4.4 to 4.4.92 (+12,-12)
Description: Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13077
Commits:
63c1714
hostapd: merge fixes for WPA packet number reuse with replayed messages and k... (+929,-10)
Description: Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13078
Commits:
63c1714
hostapd: merge fixes for WPA packet number reuse with replayed messages and k... (+929,-10)
Description: Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13079
Commits:
63c1714
hostapd: merge fixes for WPA packet number reuse with replayed messages and k... (+929,-10)
Description: Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080
Commits:
63c1714
hostapd: merge fixes for WPA packet number reuse with replayed messages and k... (+929,-10)
a5e1f7f
mac80211: backport kernel fix for CVE-2017-13080 (+81)
Description: Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13081
Commits:
63c1714
hostapd: merge fixes for WPA packet number reuse with replayed messages and k... (+929,-10)
Description: Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13082
Commits:
63c1714
hostapd: merge fixes for WPA packet number reuse with replayed messages and k... (+929,-10)
Description: Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13086
Commits:
63c1714
hostapd: merge fixes for WPA packet number reuse with replayed messages and k... (+929,-10)
Description: Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087
Commits:
63c1714
hostapd: merge fixes for WPA packet number reuse with replayed messages and k... (+929,-10)
Description: Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13088
Commits:
63c1714
hostapd: merge fixes for WPA packet number reuse with replayed messages and k... (+929,-10)
Description: The KVM subsystem in the Linux kernel through 4.13.3 allows guest OS users to cause a denial of service (assertion failure, and hypervisor hang or crash) via an out-of bounds guest_irq value, related to arch/x86/kvm/vmx.c and virt/kvm/eventfd.c.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000252
Commits:
fa0b5fc
kernel: bump 4.4 to 4.4.92 (+12,-12)