![]() |
Thanks Didier Spaier
I read about KRACK this morning on The Register There are a few additional links in there, but I didn't see a link to the site you linked. EDIT: The Placeholder WebSite in The Register now links to your link. Thanks again. -- kjh |
wpa_supplicant patched. See w1.fi/security/2017-1/
|
Successfully patched/built/ran wpa_supplicant v2.6 to mitigate KRACK.
After pulling rebased-v2.6-0001 through 0008 patches from w1.fi/security/2017-1/ I added the following to the stock slackware wpa_supplicant build script after line 88: #KRACK for i in $(ls -1 $CWD/patches/rebased*.patch); do cat $i | patch -p1 --verbose || exit 1 done |
Follow up: Vulnerability Note VU#228519
http://www.kb.cert.org/vuls/id/228519
See also for Intel devices and associated firmware: https://security-center.intel.com/ad...nguageid=en-fr |
Fixes for Slackware provided, thanks.
|
curl-7.56.1
curl-7.56.1 is released with security fixes.
https://curl.haxx.se/download/curl-7.56.1.tar.xz https://curl.haxx.se/download/curl-7.56.1.tar.xz.asc Quote:
|
irssi 1.0.5 has been released, fixing CVE-2017-15228, CVE-2017-15227, CVE-2017-15721, CVE-2017-15723 and CVE-2017-15722. See https://irssi.org/2017/10/22/irssi-1.0.5-released/ and https://irssi.org/security/irssi_sa_2017_10.txt for details. Upgrading is recommended.
|
php-5.6.32
php-5.6.32 is released with security fix.
Quote:
|
curl-7.57.0
curl-7.57.0 is released with 3 security fixes :
Quote:
|
New Intel/AMD/ARM CPUs that are implementing speculative execution ( https://en.wikipedia.org/wiki/Speculative_execution ) look to be affected by a new security issue. A new kernel patch / maybe a whole new kernel will be soon required:
" Intel and other technology companies have been made aware of new security research describing software analysis methods that, when used for malicious purposes, have the potential to improperly gather sensitive data from computing devices that are operating as designed. Intel believes these exploits do not have the potential to corrupt, modify or delete data. " https://newsroom.intel.com/news/inte...arch-findings/ Original findings: https://security.googleblog.com/2018...-you-need.html An article with useful links: https://thehackernews.com/2018/01/in...erability.html And, the two exploits: https://meltdownattack.com/ |
Quote:
MS started rolling out patches to their fast tier insider testers in November 2017. |
Quote:
|
Quote:
https://en.wikipedia.org/wiki/Spectr...vulnerability) |
Quote:
|
Quote:
Quote:
|
All times are GMT -5. The time now is 09:44 AM. |