← Back to team overview

ubuntu-phone team mailing list archive

Re: WPA2 protocol vulnerability

 

Hi

A update from Ubuntu would be ideal but failing that I wonder if
manually installing the wpasupplicant deb from xenial or recompiling it
would work?

- https://packages.ubuntu.com/xenial-updates/wpasupplicant

It would be a shame if this security issue is going to cause still
working phones to be rendered too insecure to be usable.

All the best

Chris


On Wed 18-Oct-2017 at 09:34:14AM +0200, Matthias Apitz wrote:
> 
> Maybe a silly question: Can we expect from Canonical or BQ.com an
> emergency fix for this?
> 
> 
> 
> ----- Forwarded message from FreeBSD Security Advisories <security-advisories@xxxxxxxxxxx> -----
> 
> Date: Tue, 17 Oct 2017 18:22:51 +0000 (UTC)
> From: FreeBSD Security Advisories <security-advisories@xxxxxxxxxxx>
> To: FreeBSD Security Advisories <security-advisories@xxxxxxxxxxx>
> Subject: FreeBSD Security Advisory FreeBSD-SA-17:07.wpa
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA512
> 
> =============================================================================
> FreeBSD-SA-17:07.wpa                                        Security Advisory
>                                                           The FreeBSD Project
> 
> Topic:          WPA2 protocol vulnerability


-- 
Webarchitects Co-operative
http://webarchitects.coop/
+44 114 276 9709
@webarchcoop


Follow ups

References