Date: Mon, 16 Oct 2017 20:56:03 +0200 From: Franco Fichtner <franco@lastsummer.de> To: Cy Schubert <Cy.Schubert@komquats.com> Cc: "Rodney W. Grimes" <freebsd-rwg@pdx.rh.CN85.dnsmgr.net>, Kevin Oberman <rkoberman@gmail.com>, Adrian Chadd <adrian.chadd@gmail.com>, Lev Serebryakov <lev@freebsd.org>, blubee blubeeme <gurenchan@gmail.com>, Poul-Henning Kamp <phk@phk.freebsd.dk>, FreeBSD current <freebsd-current@freebsd.org> Subject: Re: cve-2017-13077 - WPA2 security vulni Message-ID: <4CF70CE3-AC4B-4AFE-BF14-C78C5310F2EB@lastsummer.de> In-Reply-To: <20171016185014.94859750@spqr.komquats.com> References: <20171016185014.94859750@spqr.komquats.com>
next in thread | previous in thread | raw e-mail | index | archive | help
> On 16. Oct 2017, at 8:50 PM, Cy Schubert <Cy.Schubert@komquats.com> = wrote: >=20 > Eight patches have been posted so, it should be easy to patch 2.5, = MFC, and bring head up to 2.6 later. This should avoid the risk of = possible regressions. Nope, does not apply easily. Refactoring changed contexts, function = names and variable usage logic between 2.5 and 2.6. Cheers, Franco=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4CF70CE3-AC4B-4AFE-BF14-C78C5310F2EB>