RE: cve-2017-13077 - WPA2 security vulni

From: Cy Schubert <Cy.Schubert_at_komquats.com>
Date: Mon, 16 Oct 2017 13:19:56 -0700
It doesn't, which is why I patched the port at lunch today. It's a quick win with the time I had.

I think we should update base to 2.6 and apply the patches.

---
Sent using a tiny phone keyboard. Apologies for any typos and autocorrect.

Cy Schubert
<Cy.Schubert_at_cschubert.com> or <cy_at_freebsd.org>

-----Original Message-----
From: Franco Fichtner
Sent: 16/10/2017 11:57
To: Cy Schubert
Cc: Rodney W. Grimes; Kevin Oberman; Adrian Chadd; Lev Serebryakov; blubee blubeeme; Poul-Henning Kamp; FreeBSD current
Subject: Re: cve-2017-13077 - WPA2 security vulni


> On 16. Oct 2017, at 8:50 PM, Cy Schubert <Cy.Schubert_at_komquats.com> wrote:
> 
> Eight patches have been posted so, it should be easy to patch 2.5, MFC, and bring head up to 2.6 later. This should avoid the risk of possible regressions.

Nope, does not apply easily.  Refactoring changed contexts, function names
and variable usage logic between 2.5 and 2.6.


Cheers,
Franco
Received on Mon Oct 16 2017 - 18:20:06 UTC

This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:41:13 UTC