From 41f5cdf5266defc096e5f45b108b632358519ff9 Mon Sep 17 00:00:00 2001 From: Matthias Schiffer Date: Wed, 4 Oct 2017 00:45:05 +0200 Subject: [PATCH] docs: v2017.1.3 release notes --- docs/index.rst | 1 + docs/releases/v2017.1.3.rst | 65 +++++++++++++++++++++++++++++++++++++ 2 files changed, 66 insertions(+) create mode 100644 docs/releases/v2017.1.3.rst diff --git a/docs/index.rst b/docs/index.rst index 0cfb6dcd..cd5250e3 100644 --- a/docs/index.rst +++ b/docs/index.rst @@ -64,6 +64,7 @@ Several Freifunk communities in Germany use Gluon as the foundation of their Fre :caption: Releases :maxdepth: 1 + releases/v2017.1.3 releases/v2017.1.2 releases/v2017.1.1 releases/v2017.1 diff --git a/docs/releases/v2017.1.3.rst b/docs/releases/v2017.1.3.rst new file mode 100644 index 00000000..7eb27e8b --- /dev/null +++ b/docs/releases/v2017.1.3.rst @@ -0,0 +1,65 @@ +Gluon 2017.1.3 +============== + +The LEDE base of Gluon has been updated to v17.01.3, including various updates, +stability improvements and security fixes. This includes some critical fixes +to core packages like dnsmasq (see below for details); upgrading all Gluon +nodes to v2017.1.3 is highly recommended. + + +Bugfixes +~~~~~~~~ + +* dnsmasq has been upgraded to v2.78, fixing CVE-2017-13704, CVE-2017-14491, + CVE-2017-14492, CVE-2017-14493, CVE-2017-14494, 2017-CVE-14495 and + 2017-CVE-14496 + + While many of the most severe (remote code execution) vulnarabilities are in + the DHCP component of dnsmasq, which is not active on a Gluon node unless in + Config Mode, CVE-2017-14491 does affect us. An attacker can cause memory + corruption and possibly remote code execution by deploying a malicious DNS + server and tricking a node into querying this server. + +* The Linux kernel has been upgraded to v4.4.89 + +* Multiple security issues have been fixed in packages that are not usually part + of the Gluon build, including tcpdump, curl and mbedtls + + Please refer to the + `LEDE commit log `_ + for details. + +* Filtering of multicast packages between the mesh and the *local-node* interface + has been fixed (`#1230 `_) + + This issue was causing gluon-radvd to send a router advertisement to the local + clients whenever a router solicitation from the mesh was received. In busy + meshes, it would continuously send router advertisements every 3 seconds. + +* Reject autoupdater mirror URLs not starting with ``http://`` during build + (`9ab93992d1fc `_) + +* Fix MAC addresses on TP-Link TL-WR1043ND v4 when installing Gluon over newer + stock firmwares (`#1223 `_) + + +Known issues +~~~~~~~~~~~~ + +* Default TX power on many Ubiquiti devices is too high, correct offsets are unknown (`#94 `_) + + Reducing the TX power in the Advanced Settings is recommended. + +* The MAC address of the WAN interface is modified even when Mesh-on-WAN is disabled (`#496 `_) + + This may lead to issues in environments where a fixed MAC address is expected (like VMware when promicious mode is disallowed). + +* Inconsistent respondd API (`#522 `_) + + The current API is inconsistent and will be replaced eventually. The old API will still be supported for a while. + +* Sporadic segfaults of busybox (ash) when running shell scripts on ar71xx + (`#1157 `_) + + The workaround added in Gluon v2017.1.1 has greatly reduced the frequency of + segfaults, but did not make them disappear completely.