forked from mirror/openwrt
Refresh all patches. The removed patches were integrated upstream. This contains fixes for CVE-2020-3702 1. These patches (ath, ath9k, mac80211) were included in kernel versions since 4.14.245 and 4.19.205. They fix security vulnerability CVE-2020-3702 [1] similar to KrØØk, which was found by ESET [2]. Thank you Josef Schlehofer for reporting this problem. [1] https://nvd.nist.gov/vuln/detail/CVE-2020-3702 [2] https://www.welivesecurity.com/2020/08/06/beyond-kr00k-even-more-wifi-chips-vulnerable-eavesdropping/ Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de> |
||
|---|---|---|
| .. | ||
| 350-ath9k_hw-reset-AHB-WMAC-interface-on-AR91xx.patch | ||
| 351-ath9k_hw-issue-external-reset-for-QCA955x.patch | ||
| 354-ath9k-force-rx_clear-when-disabling-rx.patch | ||
| 356-Revert-ath9k-interpret-requested-txpower-in-EIRP-dom.patch | ||
| 365-ath9k-adjust-tx-power-reduction-for-US-regulatory-do.patch | ||
| 401-ath9k_blink_default.patch | ||
| 410-ath9k_allow_adhoc_and_ap.patch | ||
| 450-ath9k-enabled-MFP-capability-unconditionally.patch | ||
| 500-ath9k_eeprom_debugfs.patch | ||
| 501-ath9k_ahb_init.patch | ||
| 510-ath9k_intr_mitigation_tweak.patch | ||
| 511-ath9k_reduce_rxbuf.patch | ||
| 512-ath9k_channelbw_debugfs.patch | ||
| 513-ath9k_add_pci_ids.patch | ||
| 530-ath9k_extra_leds.patch | ||
| 531-ath9k_extra_platform_leds.patch | ||
| 540-ath9k_reduce_ani_interval.patch | ||
| 542-ath9k_debugfs_diag.patch | ||
| 543-ath9k_entropy_from_adc.patch | ||
| 544-ath9k-ar933x-usb-hang-workaround.patch | ||
| 545-ath9k_ani_ws_detect.patch | ||
| 547-ath9k_led_defstate_fix.patch | ||
| 548-ath9k_enable_gpio_chip.patch | ||
| 549-ath9k_enable_gpio_buttons.patch | ||
| 550-ath9k-disable-bands-via-dt.patch | ||
| 551-ath9k_ubnt_uap_plus_hsr.patch | ||
| 552-ath9k-ahb_of.patch | ||
| 553-ath9k_of_gpio_mask.patch | ||