Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 16 Oct 2017 15:32:32 -0700
From:      Cy Schubert <Cy.Schubert@komquats.com>
To:        Franco Fichtner <franco@lastsummer.de>
Cc:        "Rodney W. Grimes" <freebsd-rwg@pdx.rh.CN85.dnsmgr.net>,  Kevin Oberman <rkoberman@gmail.com>, Adrian Chadd <adrian.chadd@gmail.com>,  Lev Serebryakov <lev@freebsd.org>, blubee blubeeme <gurenchan@gmail.com>,  Poul-Henning Kamp <phk@phk.freebsd.dk>,  FreeBSD current <freebsd-current@freebsd.org>
Subject:   RE: cve-2017-13077 - WPA2 security vulni
Message-ID:  <20171016223231.923A0191@spqr.komquats.com>

next in thread | raw e-mail | index | archive | help
I'll test it when I get home tonight. The WiFi here at the tech park is ope=
n so, I couldn't test here.

---
Sent using a tiny phone keyboard. Apologies for any typos and autocorrect.

Cy Schubert
<Cy.Schubert@cschubert.com> or <cy@freebsd.org>

-----Original Message-----
From: Franco Fichtner
Sent: 16/10/2017 13:34
To: Cy Schubert
Cc: Rodney W. Grimes; Kevin Oberman; Adrian Chadd; Lev Serebryakov; blubee =
blubeeme; Poul-Henning Kamp; FreeBSD current
Subject: Re: cve-2017-13077 - WPA2 security vulni


> On 16. Oct 2017, at 10:19 PM, Cy Schubert <Cy.Schubert@komquats.com> wrot=
e:
>=20
> It doesn't, which is why I patched the port at lunch today. It's a quick =
win with the time I had.

Thank you, much appreciated.  Will give it some testing.

> I think we should update base to 2.6 and apply the patches.

Sounds like a plan when the port gives no apparent issues.


Cheers,
Franco




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20171016223231.923A0191>