It doesn't, which is why I patched the port at lunch today. It's a quick win with the time I had. I think we should update base to 2.6 and apply the patches. --- Sent using a tiny phone keyboard. Apologies for any typos and autocorrect. Cy Schubert <Cy.Schubert_at_cschubert.com> or <cy_at_freebsd.org> -----Original Message----- From: Franco Fichtner Sent: 16/10/2017 11:57 To: Cy Schubert Cc: Rodney W. Grimes; Kevin Oberman; Adrian Chadd; Lev Serebryakov; blubee blubeeme; Poul-Henning Kamp; FreeBSD current Subject: Re: cve-2017-13077 - WPA2 security vulni > On 16. Oct 2017, at 8:50 PM, Cy Schubert <Cy.Schubert_at_komquats.com> wrote: > > Eight patches have been posted so, it should be easy to patch 2.5, MFC, and bring head up to 2.6 later. This should avoid the risk of possible regressions. Nope, does not apply easily. Refactoring changed contexts, function names and variable usage logic between 2.5 and 2.6. Cheers, FrancoReceived on Mon Oct 16 2017 - 18:20:06 UTC
This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:41:13 UTC