Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 16 Oct 2017 13:19:56 -0700
From:      Cy Schubert <Cy.Schubert@komquats.com>
To:        Franco Fichtner <franco@lastsummer.de>
Cc:        "Rodney W. Grimes" <freebsd-rwg@pdx.rh.CN85.dnsmgr.net>,  Kevin Oberman <rkoberman@gmail.com>, Adrian Chadd <adrian.chadd@gmail.com>,  Lev Serebryakov <lev@freebsd.org>, blubee blubeeme <gurenchan@gmail.com>,  Poul-Henning Kamp <phk@phk.freebsd.dk>,  FreeBSD current <freebsd-current@freebsd.org>
Subject:   RE: cve-2017-13077 - WPA2 security vulni
Message-ID:  <20171016201955.A2477AD@spqr.komquats.com>

next in thread | raw e-mail | index | archive | help
It doesn't, which is why I patched the port at lunch today. It's a quick wi=
n with the time I had.

I think we should update base to 2.6 and apply the patches.

---
Sent using a tiny phone keyboard. Apologies for any typos and autocorrect.

Cy Schubert
<Cy.Schubert@cschubert.com> or <cy@freebsd.org>

-----Original Message-----
From: Franco Fichtner
Sent: 16/10/2017 11:57
To: Cy Schubert
Cc: Rodney W. Grimes; Kevin Oberman; Adrian Chadd; Lev Serebryakov; blubee =
blubeeme; Poul-Henning Kamp; FreeBSD current
Subject: Re: cve-2017-13077 - WPA2 security vulni


> On 16. Oct 2017, at 8:50 PM, Cy Schubert <Cy.Schubert@komquats.com> wrote=
:
>=20
> Eight patches have been posted so, it should be easy to patch 2.5, MFC, a=
nd bring head up to 2.6 later. This should avoid the risk of possible regre=
ssions.

Nope, does not apply easily.  Refactoring changed contexts, function names
and variable usage logic between 2.5 and 2.6.


Cheers,
Franco



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20171016201955.A2477AD>