Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[src/netbsd-6]: src/doc ticket #859



details:   https://anonhg.NetBSD.org/src/rev/8b91a1ddc8c7
branches:  netbsd-6
changeset: 775740:8b91a1ddc8c7
user:      msaitoh <msaitoh%NetBSD.org@localhost>
date:      Fri Mar 29 00:50:32 2013 +0000

description:
ticket #859

diffstat:

 doc/CHANGES-6.1 |  20 +++++++++++++++++++-
 1 files changed, 19 insertions(+), 1 deletions(-)

diffs (31 lines):

diff -r add10e72e4b1 -r 8b91a1ddc8c7 doc/CHANGES-6.1
--- a/doc/CHANGES-6.1   Fri Mar 29 00:44:28 2013 +0000
+++ b/doc/CHANGES-6.1   Fri Mar 29 00:50:32 2013 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: CHANGES-6.1,v 1.1.2.113 2013/03/15 23:26:27 riz Exp $
+# $NetBSD: CHANGES-6.1,v 1.1.2.114 2013/03/29 00:50:32 msaitoh Exp $
 
 A complete list of changes from the 6.0 release until the 6.1 release:
 
@@ -8730,3 +8730,21 @@
        Welcome to 6.1_RC2!
        [riz]
 
+sys/kern/subr_cprng.c                          1.16
+
+       Re-fix 'fix' for SA-2013-003.  Because the original fix evaluated a
+       flag backwards, in low-entropy conditions there was a time interval
+       in which /dev/urandom could still output bits on an unacceptably
+       short key.  Output from /dev/random was *NOT* impacted.
+
+       Eliminate the flag in question -- it's safest to always fill the
+       requested key buffer with output from the entropy-pool, even if we
+       let the caller know we couldn't provide bytes with the full entropy
+       it requested.
+
+       Advisory will be updated soon with a full worst-case analysis of the
+       /dev/urandom output path in the presence of either variant of the
+       SA-2013-003 bug.  Fortunately, because a large amount of other input
+       is mixed in before users can obtain any output, it doesn't look as
+       dangerous in practice as I'd feared it might be.
+       [tls, ticket #859]



Home | Main Index | Thread Index | Old Index