summaryrefslogtreecommitdiffstats
path: root/source/n/wpa_supplicant/patches/wpa_supplicant-flush-debug-output.patch
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2022-01-19 18:18:02 +0000
committer Eric Hameleers <alien@slackware.com>2022-01-20 08:59:56 +0100
commitf8721233ca388707ef95cde2fe3fcfad12f50f46 (patch)
treeee58f27d2192509882b82c55b7e19caaa326cdaf /source/n/wpa_supplicant/patches/wpa_supplicant-flush-debug-output.patch
parent1c7cd7d8173b5ad45462c7bfd8ba99cd013b959e (diff)
downloadcurrent-f8721233ca388707ef95cde2fe3fcfad12f50f46.tar.gz
current-f8721233ca388707ef95cde2fe3fcfad12f50f46.tar.xz
Wed Jan 19 18:18:02 UTC 202220220119181802
ap/inxi-3.3.12_1-noarch-1.txz: Upgraded. ap/man-db-2.9.4-x86_64-3.txz: Rebuilt. Don't use --no-purge in the daily cron job to update the databases. l/gst-plugins-bad-free-1.18.5-x86_64-4.txz: Rebuilt. Link against neon-0.32.2. Thanks to marav. n/bind-9.16.25-x86_64-1.txz: Upgraded. n/ethtool-5.16-x86_64-1.txz: Upgraded. n/samba-4.15.4-x86_64-1.txz: Upgraded. n/wpa_supplicant-2.10-x86_64-1.txz: Upgraded. The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23303 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23304 (* Security fix *) x/xterm-370-x86_64-6.txz: Rebuilt. XTerm-console: improve the font settings. Thanks to GazL.
Diffstat (limited to 'source/n/wpa_supplicant/patches/wpa_supplicant-flush-debug-output.patch')
-rw-r--r--source/n/wpa_supplicant/patches/wpa_supplicant-flush-debug-output.patch49
1 files changed, 0 insertions, 49 deletions
diff --git a/source/n/wpa_supplicant/patches/wpa_supplicant-flush-debug-output.patch b/source/n/wpa_supplicant/patches/wpa_supplicant-flush-debug-output.patch
deleted file mode 100644
index a68685186..000000000
--- a/source/n/wpa_supplicant/patches/wpa_supplicant-flush-debug-output.patch
+++ /dev/null
@@ -1,49 +0,0 @@
---- wpa_supplicant-0.6.3/src/utils/wpa_debug.c.flush-debug 2007-07-30 23:15:34.000000000 -0400
-+++ wpa_supplicant-0.6.3/src/utils/wpa_debug.c 2007-07-30 23:17:06.000000000 -0400
-@@ -157,6 +157,7 @@ void wpa_debug_print_timestamp(void)
- if (out_file) {
- fprintf(out_file, "%ld.%06u: ", (long) tv.sec,
- (unsigned int) tv.usec);
-+ fflush(out_file);
- } else
- #endif /* CONFIG_DEBUG_FILE */
- printf("%ld.%06u: ", (long) tv.sec, (unsigned int) tv.usec);
-@@ -185,6 +186,7 @@ void wpa_printf(int level, char *fmt, ..
- if (out_file) {
- vfprintf(out_file, fmt, ap);
- fprintf(out_file, "\n");
-+ fflush(out_file);
- } else {
- #endif /* CONFIG_DEBUG_FILE */
- vprintf(fmt, ap);
-@@ -217,6 +219,7 @@ static void _wpa_hexdump(int level, cons
- fprintf(out_file, " [REMOVED]");
- }
- fprintf(out_file, "\n");
-+ fflush(out_file);
- } else {
- #endif /* CONFIG_DEBUG_FILE */
- printf("%s - hexdump(len=%lu):", title, (unsigned long) len);
-@@ -262,12 +265,14 @@ static void _wpa_hexdump_ascii(int level
- fprintf(out_file,
- "%s - hexdump_ascii(len=%lu): [REMOVED]\n",
- title, (unsigned long) len);
-+ fflush(out_file);
- return;
- }
- if (buf == NULL) {
- fprintf(out_file,
- "%s - hexdump_ascii(len=%lu): [NULL]\n",
- title, (unsigned long) len);
-+ fflush(out_file);
- return;
- }
- fprintf(out_file, "%s - hexdump_ascii(len=%lu):\n",
-@@ -292,6 +297,7 @@ static void _wpa_hexdump_ascii(int level
- pos += llen;
- len -= llen;
- }
-+ fflush(out_file);
- } else {
- #endif /* CONFIG_DEBUG_FILE */
- if (!show) {