Date: Mon, 16 Oct 2017 13:19:56 -0700 From: Cy Schubert <Cy.Schubert@komquats.com> To: Franco Fichtner <franco@lastsummer.de> Cc: "Rodney W. Grimes" <freebsd-rwg@pdx.rh.CN85.dnsmgr.net>, Kevin Oberman <rkoberman@gmail.com>, Adrian Chadd <adrian.chadd@gmail.com>, Lev Serebryakov <lev@freebsd.org>, blubee blubeeme <gurenchan@gmail.com>, Poul-Henning Kamp <phk@phk.freebsd.dk>, FreeBSD current <freebsd-current@freebsd.org> Subject: RE: cve-2017-13077 - WPA2 security vulni Message-ID: <20171016201955.A2477AD@spqr.komquats.com>
next in thread | raw e-mail | index | archive | help
It doesn't, which is why I patched the port at lunch today. It's a quick win with the time I had. I think we should update base to 2.6 and apply the patches. --- Sent using a tiny phone keyboard. Apologies for any typos and autocorrect. Cy Schubert <Cy.Schubert@cschubert.com> or <cy@freebsd.org> -----Original Message----- From: Franco Fichtner Sent: 16/10/2017 11:57 To: Cy Schubert Cc: Rodney W. Grimes; Kevin Oberman; Adrian Chadd; Lev Serebryakov; blubee blubeeme; Poul-Henning Kamp; FreeBSD current Subject: Re: cve-2017-13077 - WPA2 security vulni > On 16. Oct 2017, at 8:50 PM, Cy Schubert <Cy.Schubert@komquats.com> wrote: > > Eight patches have been posted so, it should be easy to patch 2.5, MFC, and bring head up to 2.6 later. This should avoid the risk of possible regressions. Nope, does not apply easily. Refactoring changed contexts, function names and variable usage logic between 2.5 and 2.6. Cheers, Franco
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20171016201955.A2477AD>
