Date: Mon, 16 Oct 2017 15:32:32 -0700 From: Cy Schubert <Cy.Schubert@komquats.com> To: Franco Fichtner <franco@lastsummer.de> Cc: "Rodney W. Grimes" <freebsd-rwg@pdx.rh.CN85.dnsmgr.net>, Kevin Oberman <rkoberman@gmail.com>, Adrian Chadd <adrian.chadd@gmail.com>, Lev Serebryakov <lev@freebsd.org>, blubee blubeeme <gurenchan@gmail.com>, Poul-Henning Kamp <phk@phk.freebsd.dk>, FreeBSD current <freebsd-current@freebsd.org> Subject: RE: cve-2017-13077 - WPA2 security vulni Message-ID: <20171016223231.923A0191@spqr.komquats.com>
next in thread | raw e-mail | index | archive | help
I'll test it when I get home tonight. The WiFi here at the tech park is ope= n so, I couldn't test here. --- Sent using a tiny phone keyboard. Apologies for any typos and autocorrect. Cy Schubert <Cy.Schubert@cschubert.com> or <cy@freebsd.org> -----Original Message----- From: Franco Fichtner Sent: 16/10/2017 13:34 To: Cy Schubert Cc: Rodney W. Grimes; Kevin Oberman; Adrian Chadd; Lev Serebryakov; blubee = blubeeme; Poul-Henning Kamp; FreeBSD current Subject: Re: cve-2017-13077 - WPA2 security vulni > On 16. Oct 2017, at 10:19 PM, Cy Schubert <Cy.Schubert@komquats.com> wrot= e: >=20 > It doesn't, which is why I patched the port at lunch today. It's a quick = win with the time I had. Thank you, much appreciated. Will give it some testing. > I think we should update base to 2.6 and apply the patches. Sounds like a plan when the port gives no apparent issues. Cheers, Franco
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20171016223231.923A0191>