On Fri, Oct 10, 2014 at 6:57 AM, Sébastien Marie
<semarie-open...@latrappe.fr> wrote:
> Hi David,
>
> You may have already be advertised, but in case... the current version
> of wpa_supplicant in openbsd-ports may be vulnerable to a remote command
> execution.
>
> The vulnerability description is here: 
> http://w1.fi/security/2014-1/wpacli-action-scripts.txt
>
> The vulnerability on v2.2 is triggeable if some configuration options
> are enable (CONFIG_P2P or CONFIG_WNM or CONFIG_HS20 or CONFIG_WPS), but
> I don't see any of them in current build (files/config). So I don't sure
> if the version in ports is vulnerable or not.

Indeed, our port is not vulnerable.

> Thanks.
> --
> Sébastien Marie

Ciao!
David
-- 
"If you try a few times and give up, you'll never get there. But if
you keep at it... There's a lot of problems in the world which can
really be solved by applying two or three times the persistence that
other people will."
                -- Stewart Nelson

Reply via email to