Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 16 Oct 2017 10:35:45 +0000
From:      "Poul-Henning Kamp" <phk@phk.freebsd.dk>
To:        blubee blubeeme <gurenchan@gmail.com>
Cc:        FreeBSD current <freebsd-current@freebsd.org>
Subject:   Re: cve-2017-13077 - WPA2 security vulni
Message-ID:  <2230.1508150145@critter.freebsd.dk>
In-Reply-To: <CALM2mEmawo7q7GNYLQZPovPVP3dQun5S4Aa4J8Cw2nK8g6Ux4Q@mail.gmail.com>
References:  <CALM2mEmawo7q7GNYLQZPovPVP3dQun5S4Aa4J8Cw2nK8g6Ux4Q@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
--------
In message <CALM2mEmawo7q7GNYLQZPovPVP3dQun5S4Aa4J8Cw2nK8g6Ux4Q@mail.gmail=
.com>
, blubee blubeeme writes:

>Does anyone on FreeBSD know if it's affected by this?
>https://cve.mitre.org/cgi-bin/cvename.cgi?name=3D2017-13077

It is, same as Linux, we use the same wpa_supplicant software

-- =

Poul-Henning Kamp       | UNIX since Zilog Zeus 3.20
phk@FreeBSD.ORG         | TCP/IP since RFC 956
FreeBSD committer       | BSD since 4.3-tahoe    =

Never attribute to malice what can adequately be explained by incompetence=
.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?2230.1508150145>