Module Name:    src
Committed By:   msaitoh
Date:           Fri Mar 29 00:50:33 UTC 2013

Modified Files:
        src/doc [netbsd-6]: CHANGES-6.1

Log Message:
ticket #859


To generate a diff of this commit:
cvs rdiff -u -r1.1.2.113 -r1.1.2.114 src/doc/CHANGES-6.1

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/doc/CHANGES-6.1
diff -u src/doc/CHANGES-6.1:1.1.2.113 src/doc/CHANGES-6.1:1.1.2.114
--- src/doc/CHANGES-6.1:1.1.2.113	Fri Mar 15 23:26:27 2013
+++ src/doc/CHANGES-6.1	Fri Mar 29 00:50:32 2013
@@ -1,4 +1,4 @@
-# $NetBSD: CHANGES-6.1,v 1.1.2.113 2013/03/15 23:26:27 riz Exp $
+# $NetBSD: CHANGES-6.1,v 1.1.2.114 2013/03/29 00:50:32 msaitoh Exp $
 
 A complete list of changes from the 6.0 release until the 6.1 release:
 
@@ -8730,3 +8730,21 @@ sys/sys/param.h					patched by hand
 	Welcome to 6.1_RC2!
 	[riz]
 
+sys/kern/subr_cprng.c				1.16
+
+	Re-fix 'fix' for SA-2013-003.  Because the original fix evaluated a
+	flag backwards, in low-entropy conditions there was a time interval
+	in which /dev/urandom could still output bits on an unacceptably
+	short key.  Output from /dev/random was *NOT* impacted.
+
+	Eliminate the flag in question -- it's safest to always fill the
+	requested key buffer with output from the entropy-pool, even if we
+	let the caller know we couldn't provide bytes with the full entropy
+	it requested.
+
+	Advisory will be updated soon with a full worst-case analysis of the
+	/dev/urandom output path in the presence of either variant of the
+	SA-2013-003 bug.  Fortunately, because a large amount of other input
+	is mixed in before users can obtain any output, it doesn't look as
+	dangerous in practice as I'd feared it might be.
+	[tls, ticket #859]

Reply via email to