https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=199721
Mark Linimon lini...@freebsd.org changed:
What|Removed |Added
Status|New |Closed
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=199721
--- Comment #4 from Rui Paulo rpa...@freebsd.org ---
Yes, I think we can close this bug.
--
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=199721
--- Comment #3 from Jason Unovitch jason.unovi...@gmail.com ---
rpaulo@, based off https://reviews.freebsd.org/D2436 it looks the direction
here is to not applying patches from upstream since it's not enabled/compiled.
Can you confirm that
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=199721
--- Comment #1 from jason.unovi...@gmail.com ---
Created attachment 156022
-- https://bugs.freebsd.org/bugzilla/attachment.cgi?id=156022action=edit
10-STABLE patch
--
You are receiving this mail because:
You are the assignee for the
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=199721
Oliver Pinter o...@freebsd.org changed:
What|Removed |Added
CC||o...@freebsd.org
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=199721
Bug ID: 199721
Summary: wpa_supplicant - CVE-2015-1863 patch for disabled by
default P2P option
Product: Base System
Version: 11.0-CURRENT
Hardware: Any