Patch for KRACK (CVE-2017-13077)

Aaron LI aly at aaronly.me
Tue Oct 9 21:23:36 PDT 2018


On Tue, 9 Oct 2018 20:29:41 +0800
Ridwan Shariffdeen <rshariffdeen at gmail.com> wrote:

Hi Shariffdeen

> I noticed the wpa_supplicant code in (
> https://github.com/DragonFlyBSD/DragonFlyBSD/tree/master/contrib/wpa_supplicant)
> is not updated for the last 4 years.
> 
> There was a recent disclosure of bugs in wpa standard (
> https://www.krackattacks.com/)
> 
> I am wondering if the patches are merged or this is not a valid bug for
> DragonFlyBSD?
> Please help me clarify.

Thanks for referring to the security bug in dfly's base wpa_supplicant.
Yes, the base wpa_supplicant hasn't been updated for years, and its startup
script will print a warning suggesting that users should install the latest
wpa_supplicant from dports/packages.

Nevertheless, one developer may take time to upgrade the wpa_supplicant in
base.


Cheers,
-- 
Aaron
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.dragonflybsd.org/pipermail/users/attachments/20181010/da89ba94/attachment-0002.bin>


More information about the Users mailing list