Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/netbsd-6-0]: src/doc ticket #859
details: https://anonhg.NetBSD.org/src/rev/c6585438ac53
branches: netbsd-6-0
changeset: 774783:c6585438ac53
user: msaitoh <msaitoh%NetBSD.org@localhost>
date: Fri Mar 29 00:52:23 2013 +0000
description:
ticket #859
diffstat:
doc/CHANGES-6.0.2 | 20 +++++++++++++++++++-
1 files changed, 19 insertions(+), 1 deletions(-)
diffs (31 lines):
diff -r 79782ae22f79 -r c6585438ac53 doc/CHANGES-6.0.2
--- a/doc/CHANGES-6.0.2 Fri Mar 29 00:46:58 2013 +0000
+++ b/doc/CHANGES-6.0.2 Fri Mar 29 00:52:23 2013 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: CHANGES-6.0.2,v 1.1.2.24 2013/03/15 18:52:53 riz Exp $
+# $NetBSD: CHANGES-6.0.2,v 1.1.2.25 2013/03/29 00:52:23 msaitoh Exp $
A complete list of changes from the NetBSD 6.0.1 release to the NetBSD 6.0.2
release:
@@ -169,3 +169,21 @@
such as those in /rescue.
[martin, ticket #846]
+sys/kern/subr_cprng.c 1.16
+
+ Re-fix 'fix' for SA-2013-003. Because the original fix evaluated a
+ flag backwards, in low-entropy conditions there was a time interval
+ in which /dev/urandom could still output bits on an unacceptably
+ short key. Output from /dev/random was *NOT* impacted.
+
+ Eliminate the flag in question -- it's safest to always fill the
+ requested key buffer with output from the entropy-pool, even if we
+ let the caller know we couldn't provide bytes with the full entropy
+ it requested.
+
+ Advisory will be updated soon with a full worst-case analysis of the
+ /dev/urandom output path in the presence of either variant of the
+ SA-2013-003 bug. Fortunately, because a large amount of other input
+ is mixed in before users can obtain any output, it doesn't look as
+ dangerous in practice as I'd feared it might be.
+ [tls, ticket #859]
Home |
Main Index |
Thread Index |
Old Index