Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 16 Oct 2017 22:33:24 +0200
From:      Franco Fichtner <franco@lastsummer.de>
To:        Cy Schubert <Cy.Schubert@komquats.com>
Cc:        "Rodney W. Grimes" <freebsd-rwg@pdx.rh.CN85.dnsmgr.net>, Kevin Oberman <rkoberman@gmail.com>, Adrian Chadd <adrian.chadd@gmail.com>, Lev Serebryakov <lev@freebsd.org>, blubee blubeeme <gurenchan@gmail.com>, Poul-Henning Kamp <phk@phk.freebsd.dk>, FreeBSD current <freebsd-current@freebsd.org>
Subject:   Re: cve-2017-13077 - WPA2 security vulni
Message-ID:  <17E2DA41-2CC4-42DE-A833-10A69F660105@lastsummer.de>
In-Reply-To: <20171016201955.A2477AD@spqr.komquats.com>
References:  <20171016201955.A2477AD@spqr.komquats.com>

next in thread | previous in thread | raw e-mail | index | archive | help

> On 16. Oct 2017, at 10:19 PM, Cy Schubert <Cy.Schubert@komquats.com> =
wrote:
>=20
> It doesn't, which is why I patched the port at lunch today. It's a =
quick win with the time I had.

Thank you, much appreciated.  Will give it some testing.

> I think we should update base to 2.6 and apply the patches.

Sounds like a plan when the port gives no apparent issues.


Cheers,
Franco



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?17E2DA41-2CC4-42DE-A833-10A69F660105>