LEDE v17.01.6 Changelog
This changelog lists all commits done in LEDE since the v17.01.5 tag, grouped by subsystem. The changes are chronologically ordered from top to bottom and cover the Git repository history until the tagging of the final 17.01.6 release.
Build System / Buildroot (7 changes)
54c0ef6
build: bundle-libraries.sh: patch bundled ld.so (+13)
91c9400
scripts: bundle-libraries: fix build on OS X (FS#1493) (+4)
21c317a
build: fix compile error when a package includes itself in PROVIDES (+1,-1)
bcf91e5
downloads.mk: introduce name-agnostic PROJECT_GIT variable (+4,-2)
6e8f1c3
scripts: bundle-libraries: prevent loading host locales (FS#1803) (+21,-5)
9d3825a
scripts: bundle-libraries: fix logic flaw (+6,-7)
9a96ec0
LEDE v17.01.6: adjust config defaults (+11,-9)
Build System / Feeds (1 change)
9a96ec0
LEDE v17.01.6: adjust config defaults (+11,-9)
Build System / Host Utilities (9 changes)
6e78c55
tools: m4: fix compilation with glibc 2.28 (+118)
6449ed1
tools: findutils: fix compilation with glibc 2.28 (+104)
1e09cbf
tools/bison: Update to 3.0.5 (+10,-32)
866e5b4
tools/e2fsprogs: Update to 1.43.4 (+5,-5)
7955fab
tools/e2fsprogs: Update to 1.43.5 (+2,-2)
5d9114c
tools/e2fsprogs: Update to 1.43.6 (+2,-39)
79ac69d
tools/e2fsprogs: Update to 1.43.7 (+2,-2)
d35a7bf
e2fsprogs: bump to 1.44.0 (+2,-2)
8f5c55f
tools/e2fsprogs: update to 1.44.1 (+2,-2)
Build System / SDK (2 changes)
d93ef3c
sdk: bundle usbip userspace sources (+4)
b7e3f10
sdk: include arch/arm/ Linux includes along with arch/arm64/ ones (+7,-1)
Kernel (6 changes)
91d2093
kernel: bump kernel 4.4 to version 4.4.147 (+81,-192)
0a2c984
kernel: ext4: fix check to prevent initializing reserved inodes (+68)
f3865bd
kernel: bump kernel 4.4 to version 4.4.148 (+5,-73)
9c0bab0
kernel: bump kernel 4.4 to version 4.4.150 (+4,-4)
8a72a86
kernel: bump kernel 4.4 to version 4.4.151 (+2,-2)
f712db9
kernel: bump kernel 4.4 to version 4.4.153 (+25,-25)
Packages / Boot Loaders (2 changes)
Packages / Common (10 changes)
828eaee
mtd: support bad blocks within the mtd_fixtrx() (+29,-7)
79c8f2f
mtd: improve check for TRX header being already fixed (+9,-8)
2725ad8
iproute2: merge upstream CAKE support (+1.5K)
e5b7404
kmod-sched-cake: bump to 20180716 (+4,-3)
⇒ c1a0c8e
Refactor length handling code to better centralise overhead calculations. (+16,-14)
⇒ 0517357
Rework overhead compensation to use dynamic transport header offset instead o... (+27,-23)
⇒ 71c7b44
Gather more statistics about packet length transformations. (+32,-10)
⇒ c7ca1a3
Gather more statistics about packet length transformations. (+36,-14)
⇒ 9cd2fa8
Split tin stats to its own structure to decrease size of tc_cake_xstats (+62,-53)
⇒ a3bab9d
Export overhead compensation stats to userspace. (+15,-1)
⇒ d2d6780
Reinitialise overhead compensation stats when reconfiguring. (+7)
⇒ 0afc1be
Fixes for 4.16 (+17,-1)
⇒ 71ee81a
Add a comment explaining use of prandom_u32() in deficit accounting (+2)
⇒ 16d7fed
Report the tin quantum as part of the stats output (+4,-1)
⇒ 240607e
Don't use get_s32 to get an u32 value (+1,-1)
⇒ fde77e2
Fix the ABI (warning: major breakage) (+63,-123)
⇒ 7a20432
Layer 3 is the network layer, not the transport layer (+15,-15)
⇒ b882527
Only scale minimum queue size with number of flows in ingress mode (+14,-5)
⇒ 57d18a2
Rework "Only scale minimum queue size with number of flows in ingress mode" (+21,-29)
⇒ 1328095
Layer 3 is the network layer, not the transport layer (+15,-15)
⇒ + 96 more...
b398332
wpa_supplicant: fix CVE-2018-14526 (+43)
9bc43f3
curl: fix some security problems (+385,-45)
5886a50
mbedtls: update to version 2.7.5 (+4,-4)
d3b8b5b
openssl: update to version 1.0.2p (+4,-4)
bb7c4cf
dropbear: backport upstream fix for CVE-2018-15599 (+224,-3)
d3e325d
bzip2: Fix CVE-2016-3189 (+12,-1)
Packages / Firmware (2 changes)
55ab864
firmware: intel-microcode: bump to 20180703 (+6,-6)
b5d9776
firmware: amd64-microcode: update to 20180524 (+2,-2)
Packages / LEDE base files (1 change)
9a96ec0
LEDE v17.01.6: adjust config defaults (+11,-9)
Packages / LEDE network userland (1 change)
309414e
uclient: update to latest git HEAD (+4,-4)
⇒ f2573da
uclient-fetch: use package name pattern in message for missing SSL library (+1,-1)
⇒ 9fd8070
uclient-fetch: Check for nullpointer returned by uclient_get_url_filename (+6)
⇒ f41ff60
uclient-http: basic auth: Handle memory allocation failure (+7,-2)
⇒ a73b23b
uclient-http: auth digest: Handle multiple possible memory allocation failures (+34,-9)
⇒ 66fb58d
uclient-http: Handle memory allocation failure (+3)
⇒ 2ac991b
uclient: Handle memory allocation failure for url (+3)
⇒ 63beea4
uclient-http: Implement error handling for header-sending (+24,-13)
⇒ eb850df
uclient-utils: Handle memory allocation failure for url file name (+1,-1)
⇒ ae1c656
uclient-http: Close ustream file handle only if allocated (+2,-1)
Target / apm821xx (2 changes)
aee5c53
apm821xx: fix sata access freezes (+25)
91d2093
kernel: bump kernel 4.4 to version 4.4.147 (+81,-192)
Target / ar71xx (1 change)
91d2093
kernel: bump kernel 4.4 to version 4.4.147 (+81,-192)
Target / bcm53xx (1 change)
91d2093
kernel: bump kernel 4.4 to version 4.4.147 (+81,-192)
Target / brcm2708 (1 change)
91d2093
kernel: bump kernel 4.4 to version 4.4.147 (+81,-192)
Target / brcm47xx (2 changes)
583fd4b
brcm47xx: revert upstream commit breaking BCM4718A1 (+76)
f3865bd
kernel: bump kernel 4.4 to version 4.4.148 (+5,-73)
Target / brcm63xx (1 change)
91d2093
kernel: bump kernel 4.4 to version 4.4.147 (+81,-192)
Target / cns3xxx (1 change)
f712db9
kernel: bump kernel 4.4 to version 4.4.153 (+25,-25)
Target / imx6 (1 change)
91d2093
kernel: bump kernel 4.4 to version 4.4.147 (+81,-192)
Target / ipq806x (1 change)
91d2093
kernel: bump kernel 4.4 to version 4.4.147 (+81,-192)
Target / ixp4xx (1 change)
91d2093
kernel: bump kernel 4.4 to version 4.4.147 (+81,-192)
Target / layerscape (2 changes)
91d2093
kernel: bump kernel 4.4 to version 4.4.147 (+81,-192)
9c0bab0
kernel: bump kernel 4.4 to version 4.4.150 (+4,-4)
Target / mediatek (2 changes)
91d2093
kernel: bump kernel 4.4 to version 4.4.147 (+81,-192)
f712db9
kernel: bump kernel 4.4 to version 4.4.153 (+25,-25)
Target / mpc85xx (1 change)
28d4e55
WDR4900v1 remove dt node for absent hw crypto. (+24)
Target / oxnas (1 change)
91d2093
kernel: bump kernel 4.4 to version 4.4.147 (+81,-192)
Target / ramips (2 changes)
91d2093
kernel: bump kernel 4.4 to version 4.4.147 (+81,-192)
f712db9
kernel: bump kernel 4.4 to version 4.4.153 (+25,-25)
Target / x86 (1 change)
91d2093
kernel: bump kernel 4.4 to version 4.4.147 (+81,-192)
Wireless / Common (11 changes)
85e6ac4
mac80211: brcmfmac: group 4.11 backport patches ()
f8c364b
mac80211: brcmfmac: backport use-after-free fix from 4.11 (+62,-1)
00b4e65
mac80211: brcmfmac: backport important changes from the 4.12 (+613,-5)
e3bc2e4
mac80211: brcmfmac: backport important changes from the 4.13 (+259,-4)
6805e44
mac80211: brcmfmac: backport important changes from the 4.14 (+250,-5)
57102f6
mac80211: brcmfmac: backport important changes from the 4.15 (+100,-1)
84ef414
mac80211: brcmfmac: backport important changes from the 4.16 (+74,-1)
9d8940c
mac80211: brcmfmac: backport important changes from the 4.18 (+393,-2)
0c76265
mac80211: brcmfmac: backport important changes from the 4.19 (+472,-2)
13f2195
mac80211: brcmfmac: backport patch setting WIPHY_FLAG_HAVE_AP_SME (+36,-2)
9e864bf
mac80211: brcmfmac: fix compilation with SDIO support (+12,-2)
Wireless / MT76 (1 change)
5584004
mt76: Fix mirror hash (+1,-1)
Addressed bugs
#1493
Description: Failed to build the Openwrt SDK on macOS
Link: https://bugs.openwrt.org/index.php?do=details&task_id=1493
Commits:
91c9400
scripts: bundle-libraries: fix build on OS X (FS#1493) (+4)
#1725
Description: Wireguard & Wireguard-Tools not built for aarch64_cortex-a53 (raspberry pi 3)
Link: https://bugs.openwrt.org/index.php?do=details&task_id=1725
Commits:
b7e3f10
sdk: include arch/arm/ Linux includes along with arch/arm64/ ones (+7,-1)
#1803
Description: mcopy/mmd included with openwrt-imagebuilder-18.06.1 fail with error in _nl_intern_locale_data
Link: https://bugs.openwrt.org/index.php?do=details&task_id=1803
Commits:
6e8f1c3
scripts: bundle-libraries: prevent loading host locales (FS#1803) (+21,-5)
Security fixes
CVE-2015-8370
Description: Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8370
Commits:
6aae528
grub2: Fix CVE-2015-8370 (+45,-1)
2252731
grub2: rebase patches (+4,-8)
CVE-2016-3189
Description: Use-after-free vulnerability in bzip2recover in bzip2 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted bzip2 file, related to block ends set to before the start of the block.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3189
Commits:
d3e325d
bzip2: Fix CVE-2016-3189 (+12,-1)
CVE-2017-5715
Description: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
Commits:
b5d9776
firmware: amd64-microcode: update to 20180524 (+2,-2)
CVE-2017-1000254
Description: libcurl may read outside of a heap allocated buffer when doing FTP. When libcurl connects to an FTP server and successfully logs in (anonymous or not), it asks the server for the current directory with the `PWD` command. The server then responds with a 257 response containing the path, inside double quotes. The returned path name is then kept by libcurl for subsequent uses. Due to a flaw in the string parser for this directory name, a directory name passed like this but without a closing double quote would lead to libcurl not adding a trailing NUL byte to the buffer holding the name. When libcurl would then later access the string, it could read beyond the allocated heap buffer and crash or wrongly access data beyond the buffer, thinking it was part of the path. A malicious server could abuse this fact and effectively prevent libcurl-based clients to work with it - the PWD command is always issued on new FTP connections and the mistake has a high chance of causing a segfault. The simple fact that this has issue remained undiscovered for this long could suggest that malformed PWD responses are rare in benign servers. We are not aware of any exploit of this flaw. This bug was introduced in commit [415d2e7cb7](https://github.com/curl/curl/commit/415d2e7cb7), March 2005. In libcurl version 7.56.0, the parser always zero terminates the string but also rejects it if not terminated properly with a final double quote.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
Commits:
9bc43f3
curl: fix some security problems (+385,-45)
CVE-2017-1000257
Description: An IMAP FETCH response line indicates the size of the returned data, in number of bytes. When that response says the data is zero bytes, libcurl would pass on that (non-existing) data with a pointer and the size (zero) to the deliver-data function. libcurl's deliver-data function treats zero as a magic number and invokes strlen() on the data to figure out the length. The strlen() is called on a heap based buffer that might not be zero terminated so libcurl might read beyond the end of it into whatever memory lies after (or just crash) and then deliver that to the application as if it was actually downloaded.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000257
Commits:
9bc43f3
curl: fix some security problems (+385,-45)
CVE-2018-0497
Description: ARM mbed TLS before 2.12.0, before 2.7.5, and before 2.1.14 allows remote attackers to achieve partial plaintext recovery (for a CBC based ciphersuite) via a timing-based side-channel attack. This vulnerability exists because of an incorrect fix (with a wrong SHA-384 calculation) for CVE-2013-0169.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0497
Commits:
5886a50
mbedtls: update to version 2.7.5 (+4,-4)
CVE-2018-0498
Description: ARM mbed TLS before 2.12.0, before 2.7.5, and before 2.1.14 allows local users to achieve partial plaintext recovery (for a CBC based ciphersuite) via a cache-based side-channel attack.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0498
Commits:
5886a50
mbedtls: update to version 2.7.5 (+4,-4)
CVE-2018-0732
Description: During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732
Commits:
d3b8b5b
openssl: update to version 1.0.2p (+4,-4)
CVE-2018-0737
Description: The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737
Commits:
d3b8b5b
openssl: update to version 1.0.2p (+4,-4)
CVE-2018-3620
Description: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620
Commits:
f3865bd
kernel: bump kernel 4.4 to version 4.4.148 (+5,-73)
CVE-2018-3639
Description: Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639
Commits:
55ab864
firmware: intel-microcode: bump to 20180703 (+6,-6)
CVE-2018-3640
Description: Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3640
Commits:
55ab864
firmware: intel-microcode: bump to 20180703 (+6,-6)
CVE-2018-3646
Description: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646
Commits:
f3865bd
kernel: bump kernel 4.4 to version 4.4.148 (+5,-73)
CVE-2018-14526
Description: An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access Point and client can abuse the vulnerability to recover sensitive information.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14526
Commits:
b398332
wpa_supplicant: fix CVE-2018-14526 (+43)
CVE-2018-15599
Description: The recv_msg_userauth_request function in svr-auth.c in Dropbear through 2018.76 is prone to a user enumeration vulnerability because username validity affects how fields in SSH_MSG_USERAUTH messages are handled, a similar issue to CVE-2018-15473 in an unrelated codebase.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15599
Commits:
bb7c4cf
dropbear: backport upstream fix for CVE-2018-15599 (+224,-3)
CVE-2018-1000005
Description: libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported (https://github.com/curl/curl/pull/2231) that reading an HTTP/2 trailer could mess up future trailers since the stored size was one byte less than required. The problem is that the code that creates HTTP/1-like headers from the HTTP/2 trailer data once appended a string like `:` to the target buffer, while this was recently changed to `: ` (a space was added after the colon) but the following math wasn't updated correspondingly. When accessed, the data is read out of bounds and causes either a crash or that the (too large) data gets passed to client write. This could lead to a denial-of-service situation or an information disclosure if someone has a service that echoes back or uses the trailers for something.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000005
Commits:
9bc43f3
curl: fix some security problems (+385,-45)
CVE-2018-1000007
Description: libcurl 7.1 through 7.57.0 might accidentally leak authentication data to third parties. When asked to send custom headers in its HTTP requests, libcurl will send that set of headers first to the host in the initial URL but also, if asked to follow redirects and a 30X HTTP response code is returned, to the host mentioned in URL in the `Location:` response header value. Sending the same set of headers to subsequest hosts is in particular a problem for applications that pass on custom `Authorization:` headers, as this header often contains privacy sensitive information or data that could allow others to impersonate the libcurl-using client's request.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000007
Commits:
9bc43f3
curl: fix some security problems (+385,-45)
CVE-2018-1000120
Description: A buffer overflow exists in curl 7.12.3 to and including curl 7.58.0 in the FTP URL handling that allows an attacker to cause a denial of service or worse.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120
Commits:
9bc43f3
curl: fix some security problems (+385,-45)
CVE-2018-1000121
Description: A NULL pointer dereference exists in curl 7.21.0 to and including curl 7.58.0 in the LDAP code that allows an attacker to cause a denial of service
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121
Commits:
9bc43f3
curl: fix some security problems (+385,-45)
CVE-2018-1000122
Description: A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122
Commits:
9bc43f3
curl: fix some security problems (+385,-45)
CVE-2018-1000301
Description: curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read vulnerability in denial of service that can result in curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded RTSP content.. This vulnerability appears to have been fixed in curl < 7.20.0 and curl >= 7.60.0.
Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000301
Commits:
9bc43f3
curl: fix some security problems (+385,-45)