Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 26 Apr 2015 02:21:14 +0200
From:      Oliver Pinter <oliver.pinter@hardenedbsd.org>
To:        Rui Paulo <rpaulo@me.com>
Cc:        "freebsd-wireless@freebsd.org" <freebsd-wireless@freebsd.org>,  FreeBSD-Current <freebsd-current@freebsd.org>, security@freebsd.org
Subject:   Re: CTF: wpa_supplicant/hostapd 2.4 import
Message-ID:  <CAPQ4ffsjyibQDGLyN7yKK2BLF8Scz_oy9QdCevpYnUQAwyfNAw@mail.gmail.com>
In-Reply-To: <CAPQ4ffuhZa3X-ra3EoPvdZ30cA5PFYuhyPP72dfdhnfSiyn1kg@mail.gmail.com>
References:  <1537009.8hcWOSdFGB@akita> <CAPQ4ffuhZa3X-ra3EoPvdZ30cA5PFYuhyPP72dfdhnfSiyn1kg@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On 4/23/15, Oliver Pinter <oliver.pinter@hardenedbsd.org> wrote:
> Rui, FYI: http://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt
>
> On Sun, Apr 19, 2015 at 9:41 PM, Rui Paulo <rpaulo@me.com> wrote:
>> Hi,
>>
>> Please test the new wpa_supplicant/hostapd.  Here's the patch against
>> FreeBSD
>> HEAD:
>>
>>         https://people.freebsd.org/~rpaulo/wpa-2.4.diff
>>
>> Thanks,

Hi Rui!

Could you please cherry-pick / merge this commit from DragonflyBSD:
https://github.com/DragonFlyBSD/DragonFlyBSD/commit/584c4a9f0c9071cb62abe9c870a2b08afe746a88
?

This fixes the CVE-2015-1863 .

>> --
>> Rui Paulo
>> _______________________________________________
>> freebsd-current@freebsd.org mailing list
>> http://lists.freebsd.org/mailman/listinfo/freebsd-current
>> To unsubscribe, send any mail to
>> "freebsd-current-unsubscribe@freebsd.org"
>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAPQ4ffsjyibQDGLyN7yKK2BLF8Scz_oy9QdCevpYnUQAwyfNAw>