Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 16 Oct 2017 20:56:03 +0200
From:      Franco Fichtner <franco@lastsummer.de>
To:        Cy Schubert <Cy.Schubert@komquats.com>
Cc:        "Rodney W. Grimes" <freebsd-rwg@pdx.rh.CN85.dnsmgr.net>, Kevin Oberman <rkoberman@gmail.com>, Adrian Chadd <adrian.chadd@gmail.com>, Lev Serebryakov <lev@freebsd.org>, blubee blubeeme <gurenchan@gmail.com>, Poul-Henning Kamp <phk@phk.freebsd.dk>, FreeBSD current <freebsd-current@freebsd.org>
Subject:   Re: cve-2017-13077 - WPA2 security vulni
Message-ID:  <4CF70CE3-AC4B-4AFE-BF14-C78C5310F2EB@lastsummer.de>
In-Reply-To: <20171016185014.94859750@spqr.komquats.com>
References:  <20171016185014.94859750@spqr.komquats.com>

next in thread | previous in thread | raw e-mail | index | archive | help

> On 16. Oct 2017, at 8:50 PM, Cy Schubert <Cy.Schubert@komquats.com> =
wrote:
>=20
> Eight patches have been posted so, it should be easy to patch 2.5, =
MFC, and bring head up to 2.6 later. This should avoid the risk of =
possible regressions.

Nope, does not apply easily.  Refactoring changed contexts, function =
names
and variable usage logic between 2.5 and 2.6.


Cheers,
Franco=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4CF70CE3-AC4B-4AFE-BF14-C78C5310F2EB>