mirror of
https://github.com/openwrt/openwrt.git
synced 2025-01-18 02:40:19 +00:00
97bc59a5c0
Refresh all patches. The removed patches were integrated upstream. This contains fixes for CVE-2020-3702 1. These patches (ath, ath9k, mac80211) were included in kernel versions since 4.14.245 and 4.19.205. They fix security vulnerability CVE-2020-3702 [1] similar to KrØØk, which was found by ESET [2]. Thank you Josef Schlehofer for reporting this problem. [1] https://nvd.nist.gov/vuln/detail/CVE-2020-3702 [2] https://www.welivesecurity.com/2020/08/06/beyond-kr00k-even-more-wifi-chips-vulnerable-eavesdropping/ Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
27 lines
922 B
Diff
27 lines
922 B
Diff
From: Ryder Lee <ryder.lee@mediatek.com>
|
|
Date: Fri, 18 Jun 2021 04:38:59 +0800
|
|
Subject: [PATCH] mac80211: check per vif offload_flags in Tx path
|
|
|
|
offload_flags has been introduced to indicate encap status of each interface.
|
|
An interface can encap offload at runtime, or if it has some extra limitations
|
|
it can simply override the flags, so it's more flexible to check offload_flags
|
|
in Tx path.
|
|
|
|
Signed-off-by: Ryder Lee <ryder.lee@mediatek.com>
|
|
Link: https://lore.kernel.org/r/177785418cf407808bf3a44760302d0647076990.1623961575.git.ryder.lee@mediatek.com
|
|
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
|
|
---
|
|
|
|
--- a/net/mac80211/tx.c
|
|
+++ b/net/mac80211/tx.c
|
|
@@ -3331,6 +3331,9 @@ static bool ieee80211_amsdu_aggregate(st
|
|
if (!ieee80211_hw_check(&local->hw, TX_AMSDU))
|
|
return false;
|
|
|
|
+ if (sdata->vif.offload_flags & IEEE80211_OFFLOAD_ENCAP_ENABLED)
|
|
+ return false;
|
|
+
|
|
if (skb_is_gso(skb))
|
|
return false;
|
|
|