Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 16 Oct 2017 14:03:48 +0200
From:      Miroslav Lachman <000.fbsd@quip.cz>
To:        lev@FreeBSD.org, freebsd-security <freebsd-security@freebsd.org>, freebsd-wireless <freebsd-wireless@freebsd.org>
Subject:   =?UTF-8?Q?Re:_WPA2_vulnerabilities_=e2=80=94_is_FreeBSD-as-AP_affec?= =?UTF-8?Q?ted=3f?=
Message-ID:  <59E4A024.6070708@quip.cz>
In-Reply-To: <3bcef903-4d27-b49f-81aa-9e055e22efa5@FreeBSD.org>
References:  <3bcef903-4d27-b49f-81aa-9e055e22efa5@FreeBSD.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Lev Serebryakov wrote on 10/16/2017 13:56:
>
>   There are whole lot of new vulnerabilities in WPA2 [implementations?]:
> CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080,
> CVE-2017-13081, CVE-2017-13082, CVE-2017-13084, CVE-2017-13086,
> CVE-2017-13087, CVE-2017-13088.
>
>   Does anybody know, is FreeBSD (our WiFi stack + hostapd /
> wpa_supplicant) affected?

Yes. it is discussed at current@ with patch
https://lists.freebsd.org/pipermail/freebsd-current/2017-October/067193.html

Miroslav Lachman




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?59E4A024.6070708>