On 04/16/2017 01:41 PM, yanosz wrote: > Hello, > > CVE-2016-10229 was patched in android recently. While some distributions > (ie Debian: https://security-tracker.debian.org/tracker/CVE-2016-10229) > are not vulnerable due to having backported parts of the kernel code > before, I wonder about the status in Lede (and OpenWRT). > > There are some rumors, that MSG_PEEK might be used in dnsmasq, but I > don't know any details here. > > What's the current status in lede?
This was fixed in the following upstream Linux kernel versions: v4.5-rc1 197c949e7798fbf28cfadc69d9ca0c2abbf93191 v4.4.21 dfe2042d96065f044a794f684e9f7976a4ca6e24 v3.18.45 69335972b1c1c9bd7597fc6080b6eb1bd3fbf774 v3.10.103 98f57e42cab062608cf3dce2b8eecbb2a0780ac4 LEDE 17.01 (kernel 4.4.50) was never affected by this problem. OpenWrt 15.05.1 (kernel 3.18.23) is affected by this problem, this was fixed in December 2016 in the OpenWrt CC branch by updating to version kernel version 3.18.45. I only checked which kernel version have the fix, which Debian linked, I have *not* checked if OpenWrt or LEDE are really exploitable. I also read that dnsmasq uses the problematic functionality, but I haven't verified it. Hauke _______________________________________________ Lede-dev mailing list Lede-dev@lists.infradead.org http://lists.infradead.org/mailman/listinfo/lede-dev