Hello community, here is the log from the commit of package wpa_supplicant for openSUSE:Factory checked in at 2020-10-08 13:09:48 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/wpa_supplicant (Old) and /work/SRC/openSUSE:Factory/.wpa_supplicant.new.4249 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "wpa_supplicant" Thu Oct 8 13:09:48 2020 rev:81 rq:839970 version:2.9 Changes: -------- --- /work/SRC/openSUSE:Factory/wpa_supplicant/wpa_supplicant.changes 2020-09-25 16:21:35.347362019 +0200 +++ /work/SRC/openSUSE:Factory/.wpa_supplicant.new.4249/wpa_supplicant.changes 2020-10-08 13:10:52.923101699 +0200 @@ -1,0 +2,6 @@ +Tue Oct 6 15:20:18 UTC 2020 - Florian <sp1ri...@protonmail.com> + +- Add wpa_supplicant-p2p_iname_size.diff -- Limit P2P_DEVICE name to appropriate ifname size + (https://patchwork.ozlabs.org/project/hostap/patch/20200825062902.124600-1-benja...@sipsolutions.net/) + +------------------------------------------------------------------- New: ---- wpa_supplicant-p2p_iname_size.diff ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ wpa_supplicant.spec ++++++ --- /var/tmp/diff_new_pack.OZDmYP/_old 2020-10-08 13:10:53.851102539 +0200 +++ /var/tmp/diff_new_pack.OZDmYP/_new 2020-10-08 13:10:53.855102543 +0200 @@ -41,6 +41,7 @@ Patch5: wpa_supplicant-dump-certificate-as-PEM-in-debug-mode.diff Patch6: restore-old-dbus-interface.patch Patch7: CVE-2019-16275.patch +Patch8: wpa_supplicant-p2p_iname_size.diff BuildRequires: pkgconfig BuildRequires: readline-devel BuildRequires: systemd-rpm-macros ++++++ wpa_supplicant-p2p_iname_size.diff ++++++ diff --git a/wpa_supplicant/p2p_supplicant.c b/wpa_supplicant/p2p_supplicant.c index e94bffe52..17c25889c 100644 --- a/wpa_supplicant/p2p_supplicant.c +++ b/wpa_supplicant/p2p_supplicant.c @@ -3929,6 +3929,10 @@ int wpas_p2p_add_p2pdev_interface(struct wpa_supplicant *wpa_s, wpa_s->ifname); if (os_snprintf_error(sizeof(ifname), ret)) return -1; + /* Cut length at the maximum size. Note that we don't need to ensure + * collision free names here as the created interface is not a netdev. + */ + ifname[IFNAMSIZ-1] = '\0'; force_name[0] = '\0'; wpa_s->pending_interface_type = WPA_IF_P2P_DEVICE; ret = wpa_drv_if_add(wpa_s, WPA_IF_P2P_DEVICE, ifname, NULL, NULL,