ubuntu-phone team mailing list archive
-
ubuntu-phone team
-
Mailing list archive
-
Message #24007
Re: WPA2 protocol vulnerability
Hi
A update from Ubuntu would be ideal but failing that I wonder if
manually installing the wpasupplicant deb from xenial or recompiling it
would work?
- https://packages.ubuntu.com/xenial-updates/wpasupplicant
It would be a shame if this security issue is going to cause still
working phones to be rendered too insecure to be usable.
All the best
Chris
On Wed 18-Oct-2017 at 09:34:14AM +0200, Matthias Apitz wrote:
>
> Maybe a silly question: Can we expect from Canonical or BQ.com an
> emergency fix for this?
>
>
>
> ----- Forwarded message from FreeBSD Security Advisories <security-advisories@xxxxxxxxxxx> -----
>
> Date: Tue, 17 Oct 2017 18:22:51 +0000 (UTC)
> From: FreeBSD Security Advisories <security-advisories@xxxxxxxxxxx>
> To: FreeBSD Security Advisories <security-advisories@xxxxxxxxxxx>
> Subject: FreeBSD Security Advisory FreeBSD-SA-17:07.wpa
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA512
>
> =============================================================================
> FreeBSD-SA-17:07.wpa Security Advisory
> The FreeBSD Project
>
> Topic: WPA2 protocol vulnerability
--
Webarchitects Co-operative
http://webarchitects.coop/
+44 114 276 9709
@webarchcoop
Follow ups
References