aboutsummaryrefslogtreecommitdiffstats
path: root/target/linux/generic/hack-4.14/531-debloat_lzma.patch
diff options
context:
space:
mode:
authorHauke Mehrtens <hauke@hauke-m.de>2021-09-14 23:44:19 +0200
committerHauke Mehrtens <hauke@hauke-m.de>2021-09-22 23:23:57 +0200
commit123d12eada9a8d63e790af372f30359415812228 (patch)
tree86e8cf12aa731831ef6625c855fbb5fb3800562e /target/linux/generic/hack-4.14/531-debloat_lzma.patch
parent31a2d41d64dc4bc2230d23ac84c7b47909bfb221 (diff)
downloadupstream-123d12eada9a8d63e790af372f30359415812228.tar.gz
upstream-123d12eada9a8d63e790af372f30359415812228.tar.bz2
upstream-123d12eada9a8d63e790af372f30359415812228.zip
mac80211: Update to backports-4.19.207-1
Refresh all patches. This contains fixes for CVE-2020-3702 1. These patches (ath, ath9k, mac80211) were included in kernel versions since 4.14.245 and 4.19.205. They fix security vulnerability CVE-2020-3702 [1] similar to KrØØk, which was found by ESET [2]. Thank you Josef Schlehofer for reporting this problem. [1] https://nvd.nist.gov/vuln/detail/CVE-2020-3702 [2] https://www.welivesecurity.com/2020/08/06/beyond-kr00k-even-more-wifi-chips-vulnerable-eavesdropping/ Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
Diffstat (limited to 'target/linux/generic/hack-4.14/531-debloat_lzma.patch')
0 files changed, 0 insertions, 0 deletions