From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.toke.dk (mail.toke.dk [IPv6:2a0c:4d80:42:2001::664]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.bufferbloat.net (Postfix) with ESMTPS id 7F9773CB37 for ; Tue, 11 May 2021 15:18:41 -0400 (EDT) From: Toke =?utf-8?Q?H=C3=B8iland-J=C3=B8rgensen?= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=toke.dk; s=20161023; t=1620760717; bh=vr+vb/DlRMnWwbHbfxRLk/8Ixx2cUNIm95XLcyAfzPo=; h=From:To:Subject:In-Reply-To:References:Date:From; b=E69KbyUpcq6LMr4tUgeqYQalGM6kKR8DpqQxXchkc1yIe//sbf9qAjZIXzjY2i8eR rR9QgwlVwVMNzTzQ4s+8GIpJU4LZs9W7pWbigDtslE+L51TrybiRBidqS7inDW0m1i +x5h+9GdAxKuzU4i4ZU8BPqrCV8d0gNdMSk+NjCD89h+/tcXkKR6tM8UFILpC1JMZj 9ddjrTzqiimDW6GE+qNkY8OahEImr27u6jH63aNfLNzwvBHd4x229eRBASxV7AoxuL I/l04cZllTQ8uiFbuL/rYURAqc0QmzYc0ERFTuE3EEAOogD9PaX5cJfZVmQDOiSQqN CJo77uTbZD7yA== To: Michael Yartys , Michael Yartys via Make-wifi-fast In-Reply-To: References: Date: Tue, 11 May 2021 21:18:37 +0200 X-Clacks-Overhead: GNU Terry Pratchett Message-ID: <877dk5nkoi.fsf@toke.dk> MIME-Version: 1.0 Content-Type: text/plain Subject: Re: [Make-wifi-fast] New Wi-Fi vulnerabilities X-BeenThere: make-wifi-fast@lists.bufferbloat.net X-Mailman-Version: 2.1.20 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 11 May 2021 19:18:41 -0000 Michael Yartys via Make-wifi-fast writes: > Hi > > Hot off the press! Mathy Vanhoef has uncovered new Wi-Fi exploits: > https://www.fragattacks.com/ > > Not exactly trivial to exploit, but probably interesting to this list > as it involves fragmentation and aggregation. Patches were merged into the upstream kernel today as well: https://lore.kernel.org/linux-wireless/20210511184454.164893-1-johannes@sipsolutions.net/T/ -Toke