mirror of
https://git.openwrt.org/openwrt/openwrt.git
synced 2024-06-29 12:24:11 +02:00
![Hauke Mehrtens](/assets/img/avatar_default.png)
Refresh all patches. The removed patches were integrated upstream. This contains fixes for CVE-2020-3702 1. These patches (ath, ath9k, mac80211) were included in kernel versions since 4.14.245 and 4.19.205. They fix security vulnerability CVE-2020-3702 [1] similar to KrØØk, which was found by ESET [2]. Thank you Josef Schlehofer for reporting this problem. [1] https://nvd.nist.gov/vuln/detail/CVE-2020-3702 [2] https://www.welivesecurity.com/2020/08/06/beyond-kr00k-even-more-wifi-chips-vulnerable-eavesdropping/ Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
20 lines
766 B
Diff
20 lines
766 B
Diff
--- a/drivers/net/wireless/ralink/rt2x00/rt2x00dev.c
|
|
+++ b/drivers/net/wireless/ralink/rt2x00/rt2x00dev.c
|
|
@@ -1013,6 +1013,16 @@ static int rt2x00lib_probe_hw_modes(stru
|
|
struct ieee80211_rate *rates;
|
|
unsigned int num_rates;
|
|
unsigned int i;
|
|
+#ifdef CONFIG_OF
|
|
+ struct device_node *np = rt2x00dev->dev->of_node;
|
|
+ unsigned int enabled;
|
|
+ if (!of_property_read_u32(np, "ralink,2ghz",
|
|
+ &enabled) && !enabled)
|
|
+ spec->supported_bands &= ~SUPPORT_BAND_2GHZ;
|
|
+ if (!of_property_read_u32(np, "ralink,5ghz",
|
|
+ &enabled) && !enabled)
|
|
+ spec->supported_bands &= ~SUPPORT_BAND_5GHZ;
|
|
+#endif /* CONFIG_OF */
|
|
|
|
if (rt2x00dev->dev->platform_data) {
|
|
struct rt2x00_platform_data *pdata;
|