As #OpenBSD's de-facto wifi maintainer, I first learned about this WPA problem in June. A simple patch was provided which I could commit with slight modifications.
The original embargo was already 2 months long, and then extended again for 2 months.
The generall public (you) were left in the dark about this for at least 4 months.
This is a very sad state of affairs. It takes the industry much too long to apply a simple patch.
@pierre The basic idea is that vendors hold fixes back, and cooperate to release their fixes concurrently.
On the surface, this looks reasonable.
But end-user security falls apart when information leaks, or when government agencies get involved which happens if someone requests a CVE. So in this WPA case, US gov agencies knew about the bug for at least as of the second embargo.
Does such an embargo serve your interests? Not really. As an end user, you are interested in getting a patch ASAP.