Refresh all patches. The removed patches were integrated upstream. This contains fixes for CVE-2020-3702 1. These patches (ath, ath9k, mac80211) were included in kernel versions since 4.14.245 and 4.19.205. They fix security vulnerability CVE-2020-3702 [1] similar to KrØØk, which was found by ESET [2]. Thank you Josef Schlehofer for reporting this problem. [1] https://nvd.nist.gov/vuln/detail/CVE-2020-3702 [2] https://www.welivesecurity.com/2020/08/06/beyond-kr00k-even-more-wifi-chips-vulnerable-eavesdropping/ Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
		
			
				
	
	
		
			24 lines
		
	
	
		
			881 B
		
	
	
	
		
			Diff
		
	
	
	
	
	
			
		
		
	
	
			24 lines
		
	
	
		
			881 B
		
	
	
	
		
			Diff
		
	
	
	
	
	
From: Felix Fietkau <nbd@nbd.name>
 | 
						|
Date: Thu, 17 Jun 2021 12:05:54 +0200
 | 
						|
Subject: [PATCH] mac80211: minstrel_ht: fix sample time check
 | 
						|
 | 
						|
We need to skip sampling if the next sample time is after jiffies, not before.
 | 
						|
This patch fixes an issue where in some cases only very little sampling (or none
 | 
						|
at all) is performed, leading to really bad data rates
 | 
						|
 | 
						|
Fixes: 80d55154b2f8 ("mac80211: minstrel_ht: significantly redesign the rate probing strategy")
 | 
						|
Signed-off-by: Felix Fietkau <nbd@nbd.name>
 | 
						|
---
 | 
						|
 | 
						|
--- a/net/mac80211/rc80211_minstrel_ht.c
 | 
						|
+++ b/net/mac80211/rc80211_minstrel_ht.c
 | 
						|
@@ -1450,7 +1450,7 @@ minstrel_ht_get_rate(void *priv, struct
 | 
						|
 	    (info->control.flags & IEEE80211_TX_CTRL_PORT_CTRL_PROTO))
 | 
						|
 		return;
 | 
						|
 
 | 
						|
-	if (time_is_before_jiffies(mi->sample_time))
 | 
						|
+	if (time_is_after_jiffies(mi->sample_time))
 | 
						|
 		return;
 | 
						|
 
 | 
						|
 	mi->sample_time = jiffies + MINSTREL_SAMPLE_INTERVAL;
 |