cve-2017-13077 - WPA2 security vulni
Cy Schubert
Cy.Schubert at komquats.com
Mon Oct 16 20:20:06 UTC 2017
It doesn't, which is why I patched the port at lunch today. It's a quick win with the time I had.
I think we should update base to 2.6 and apply the patches.
---
Sent using a tiny phone keyboard. Apologies for any typos and autocorrect.
Cy Schubert
<Cy.Schubert at cschubert.com> or <cy at freebsd.org>
-----Original Message-----
From: Franco Fichtner
Sent: 16/10/2017 11:57
To: Cy Schubert
Cc: Rodney W. Grimes; Kevin Oberman; Adrian Chadd; Lev Serebryakov; blubee blubeeme; Poul-Henning Kamp; FreeBSD current
Subject: Re: cve-2017-13077 - WPA2 security vulni
> On 16. Oct 2017, at 8:50 PM, Cy Schubert <Cy.Schubert at komquats.com> wrote:
>
> Eight patches have been posted so, it should be easy to patch 2.5, MFC, and bring head up to 2.6 later. This should avoid the risk of possible regressions.
Nope, does not apply easily. Refactoring changed contexts, function names
and variable usage logic between 2.5 and 2.6.
Cheers,
Franco
More information about the freebsd-current
mailing list