From owner-freebsd-current@freebsd.org Mon Oct 16 22:32:36 2017 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id B956FE4706A for ; Mon, 16 Oct 2017 22:32:36 +0000 (UTC) (envelope-from cy.schubert@komquats.com) Received: from smtp-out-no.shaw.ca (smtp-out-no.shaw.ca [64.59.134.12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "Client", Issuer "CA" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 8224470385; Mon, 16 Oct 2017 22:32:35 +0000 (UTC) (envelope-from cy.schubert@komquats.com) Received: from spqr.komquats.com ([96.50.22.10]) by shaw.ca with SMTP id 4Dw0ewSniI8mC4Dw1eFpPq; Mon, 16 Oct 2017 16:32:35 -0600 X-Authority-Analysis: v=2.2 cv=HahkdmM8 c=1 sm=1 tr=0 a=jvE2nwUzI0ECrNeyr98KWA==:117 a=jvE2nwUzI0ECrNeyr98KWA==:17 a=02M-m0pO-4AA:10 a=YxBL1-UpAAAA:8 a=6I5d2MoRAAAA:8 a=BWvPGDcYAAAA:8 a=beCajIYSYeKNm25g5KgA:9 a=CjuIK1q_8ugA:10 a=y1Rpy44EdsbgkCNY:21 a=_W_S_7VecoQA:10 a=Ia-lj3WSrqcvXOmTRaiG:22 a=IjZwj45LgO3ly-622nXo:22 a=pxhY87DP9d2VeQe4joPk:22 Received: from [25.172.12.81] (S0106d4ca6d8943b0.gv.shawcable.net [24.68.134.59]) by spqr.komquats.com (Postfix) with ESMTPSA id 923A0191; Mon, 16 Oct 2017 15:32:31 -0700 (PDT) MIME-Version: 1.0 From: Cy Schubert Subject: RE: cve-2017-13077 - WPA2 security vulni Date: Mon, 16 Oct 2017 15:32:32 -0700 To: Franco Fichtner CC: "Rodney W. Grimes" , Kevin Oberman , Adrian Chadd , Lev Serebryakov , blubee blubeeme , Poul-Henning Kamp , FreeBSD current Message-Id: <20171016223231.923A0191@spqr.komquats.com> X-CMAE-Envelope: MS4wfGwCY8x8FtSvLdxnSnEmV2Xo0/JwJyqpVzhTHDszXVE+RQA+LYTF58P/Bix05nYcipq0ybkdLl6hsPUA8KY11Dq6DKsGJimvq6nqQLKjMVWeyvg3LovY EiKMNpnYNmBrnDfdiFUJ2xRLe4uSx0VwWVPEShoA5e+fla+NnTt3xMfhRdGFyVz5qxB/343mMUKfI+8kaFvkXrwSfrwwH2FNdnUl4MNh+9oW+IZp9zVvgrqY UOUWbRUU7YJ/9UzRuLEE9Q5hNNePTX1G3t8unA7u0A7T8qC7aREK5ipcEwfBzZMO8OXcHF9lI7um904jp4g0Z2Op6UB55vBPBTDI7wnp3pamsdso/1783ycl /xcL5Sx2Pas66dZF0HYRuZvZWTPrn8E+Uf308UrPHrCZ+wcLyewF5Ksto0dJE2NfNR1W8X97 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.23 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Oct 2017 22:32:36 -0000 I'll test it when I get home tonight. The WiFi here at the tech park is ope= n so, I couldn't test here. --- Sent using a tiny phone keyboard. Apologies for any typos and autocorrect. Cy Schubert or -----Original Message----- From: Franco Fichtner Sent: 16/10/2017 13:34 To: Cy Schubert Cc: Rodney W. Grimes; Kevin Oberman; Adrian Chadd; Lev Serebryakov; blubee = blubeeme; Poul-Henning Kamp; FreeBSD current Subject: Re: cve-2017-13077 - WPA2 security vulni > On 16. Oct 2017, at 10:19 PM, Cy Schubert wrot= e: >=20 > It doesn't, which is why I patched the port at lunch today. It's a quick = win with the time I had. Thank you, much appreciated. Will give it some testing. > I think we should update base to 2.6 and apply the patches. Sounds like a plan when the port gives no apparent issues. Cheers, Franco