From owner-freebsd-current@freebsd.org Mon Oct 16 20:33:30 2017 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 2AB1DE44A87 for ; Mon, 16 Oct 2017 20:33:30 +0000 (UTC) (envelope-from franco@lastsummer.de) Received: from host64.shmhost.net (host64.shmhost.net [213.239.241.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id E36FC6C4DD; Mon, 16 Oct 2017 20:33:29 +0000 (UTC) (envelope-from franco@lastsummer.de) Received: from [IPv6:2001:470:25:233:d5b4:1be5:d68e:f1eb] (unknown [IPv6:2001:470:25:233:d5b4:1be5:d68e:f1eb]) by host64.shmhost.net (Postfix) with ESMTPSA id D9173160B94; Mon, 16 Oct 2017 22:33:24 +0200 (CEST) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\)) Subject: Re: cve-2017-13077 - WPA2 security vulni From: Franco Fichtner In-Reply-To: <20171016201955.A2477AD@spqr.komquats.com> Date: Mon, 16 Oct 2017 22:33:24 +0200 Cc: "Rodney W. Grimes" , Kevin Oberman , Adrian Chadd , Lev Serebryakov , blubee blubeeme , Poul-Henning Kamp , FreeBSD current Content-Transfer-Encoding: quoted-printable Message-Id: <17E2DA41-2CC4-42DE-A833-10A69F660105@lastsummer.de> References: <20171016201955.A2477AD@spqr.komquats.com> To: Cy Schubert X-Mailer: Apple Mail (2.3273) X-Virus-Scanned: clamav-milter 0.99.2 at host64.shmhost.net X-Virus-Status: Clean X-Spam-Flag: NO X-Spam-Score: -1.0 X-Spam-Status: No score=-1.0 tagged_above=10.0 required=10.0 tests=[ALL_TRUSTED] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Oct 2017 20:33:30 -0000 > On 16. Oct 2017, at 10:19 PM, Cy Schubert = wrote: >=20 > It doesn't, which is why I patched the port at lunch today. It's a = quick win with the time I had. Thank you, much appreciated. Will give it some testing. > I think we should update base to 2.6 and apply the patches. Sounds like a plan when the port gives no apparent issues. Cheers, Franco