Refresh all patches. The removed patches were integrated upstream. This contains fixes for CVE-2020-3702 1. These patches (ath, ath9k, mac80211) were included in kernel versions since 4.14.245 and 4.19.205. They fix security vulnerability CVE-2020-3702 [1] similar to KrØØk, which was found by ESET [2]. Thank you Josef Schlehofer for reporting this problem. [1] https://nvd.nist.gov/vuln/detail/CVE-2020-3702 [2] https://www.welivesecurity.com/2020/08/06/beyond-kr00k-even-more-wifi-chips-vulnerable-eavesdropping/ Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
34 lines
1.3 KiB
Diff
34 lines
1.3 KiB
Diff
From d946085ff5a331de64e91a2e3c96b9ca79d740f5 Mon Sep 17 00:00:00 2001
|
|
From: David Bauer <mail@david-bauer.net>
|
|
Date: Mon, 15 Jun 2020 00:10:34 +0200
|
|
Subject: [PATCH] ath9k: enabled MFP capability unconditionally
|
|
|
|
ath9k will already fallback on software-crypto for chipsets not
|
|
supporting IEEE802.11w (MFP). So advertising MFP is not dependent
|
|
on disabling HW crypto for all traffic entirely.
|
|
|
|
Signed-off-by: David Bauer <mail@david-bauer.net>
|
|
---
|
|
drivers/net/wireless/ath/ath9k/init.c | 4 +---
|
|
1 file changed, 1 insertion(+), 3 deletions(-)
|
|
|
|
--- a/drivers/net/wireless/ath/ath9k/init.c
|
|
+++ b/drivers/net/wireless/ath/ath9k/init.c
|
|
@@ -924,6 +924,7 @@ static void ath9k_set_hw_capab(struct at
|
|
ieee80211_hw_set(hw, HOST_BROADCAST_PS_BUFFERING);
|
|
ieee80211_hw_set(hw, SUPPORT_FAST_XMIT);
|
|
ieee80211_hw_set(hw, SUPPORTS_CLONED_SKBS);
|
|
+ ieee80211_hw_set(hw, MFP_CAPABLE);
|
|
|
|
if (ath9k_ps_enable)
|
|
ieee80211_hw_set(hw, SUPPORTS_PS);
|
|
@@ -936,9 +937,6 @@ static void ath9k_set_hw_capab(struct at
|
|
IEEE80211_RADIOTAP_MCS_HAVE_STBC;
|
|
}
|
|
|
|
- if (AR_SREV_9160_10_OR_LATER(sc->sc_ah) || ath9k_modparam_nohwcrypt)
|
|
- ieee80211_hw_set(hw, MFP_CAPABLE);
|
|
-
|
|
hw->wiphy->features |= NL80211_FEATURE_ACTIVE_MONITOR |
|
|
NL80211_FEATURE_AP_MODE_CHAN_WIDTH_CHANGE |
|
|
NL80211_FEATURE_P2P_GO_CTWIN;
|