Date: Sun, 26 Apr 2015 02:21:14 +0200 From: Oliver Pinter <oliver.pinter@hardenedbsd.org> To: Rui Paulo <rpaulo@me.com> Cc: "freebsd-wireless@freebsd.org" <freebsd-wireless@freebsd.org>, FreeBSD-Current <freebsd-current@freebsd.org>, security@freebsd.org Subject: Re: CTF: wpa_supplicant/hostapd 2.4 import Message-ID: <CAPQ4ffsjyibQDGLyN7yKK2BLF8Scz_oy9QdCevpYnUQAwyfNAw@mail.gmail.com> In-Reply-To: <CAPQ4ffuhZa3X-ra3EoPvdZ30cA5PFYuhyPP72dfdhnfSiyn1kg@mail.gmail.com> References: <1537009.8hcWOSdFGB@akita> <CAPQ4ffuhZa3X-ra3EoPvdZ30cA5PFYuhyPP72dfdhnfSiyn1kg@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On 4/23/15, Oliver Pinter <oliver.pinter@hardenedbsd.org> wrote: > Rui, FYI: http://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt > > On Sun, Apr 19, 2015 at 9:41 PM, Rui Paulo <rpaulo@me.com> wrote: >> Hi, >> >> Please test the new wpa_supplicant/hostapd. Here's the patch against >> FreeBSD >> HEAD: >> >> https://people.freebsd.org/~rpaulo/wpa-2.4.diff >> >> Thanks, Hi Rui! Could you please cherry-pick / merge this commit from DragonflyBSD: https://github.com/DragonFlyBSD/DragonFlyBSD/commit/584c4a9f0c9071cb62abe9c870a2b08afe746a88 ? This fixes the CVE-2015-1863 . >> -- >> Rui Paulo >> _______________________________________________ >> freebsd-current@freebsd.org mailing list >> http://lists.freebsd.org/mailman/listinfo/freebsd-current >> To unsubscribe, send any mail to >> "freebsd-current-unsubscribe@freebsd.org" >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAPQ4ffsjyibQDGLyN7yKK2BLF8Scz_oy9QdCevpYnUQAwyfNAw>